Lucene search

K
ibmIBM5E963A16D56492D265E3AD4BB10050F73E3DA9DE70902074CA74AFF7B978ADBF
HistoryJun 17, 2018 - 12:19 p.m.

Security Bulletin: IBM Case Manager may be vulnerable to Apache Commons FileUpload code execution

2018-06-1712:19:00
www.ibm.com
11

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

Summary

IBM Case Manager may be vulnerable to Apache Commons FileUpload code execution attacks.

Vulnerability Details

CVEID: CVE-2016-1000031 DESCRIPTION: Apache Commons FileUpload, as used in certain products, could allow a remote attacker to execute arbitrary code on the system, caused by deserialization of untrusted data in DiskFileItem class of the FileUpload library. A remote attacker could exploit this vulnerability to execute arbitrary code under the context of the current process.
CVSS Base Score: 9.8
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/117957&gt; for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

Affected Products and Versions

This vulnerability affects the following versions and releases:

  • IBM Case Manager 5.1.1.0 - 5.1.1.4
  • IBM Case Manager 5.2.0.0 - 5.2.0.4
  • IBM Case Manager 5.2.1.0 - 5.2.1.7
  • IBM Case Manager 5.3.0.0
  • IBM Case Manager 5.3.1.0

Remediation/Fixes

Product

|

VRMF

|

APAR

|

Remediation/First Fix

—|—|—|—
IBM Case Manager| 5.3.0.0 - 5.3.1.0| PJ45083| 5.3.2.0-ICM or later versions
IBM Case Manager| 5.2.1.0 - 5.2.1.7| PJ45082| 5.2.1.7-ICM-IF002_ or later versions_
IBM Case Manager| 5.2.0.0 - 5.2.0.4| PJ45081| 5.2.0.4-ICM-IF002or later versions
_IBM Case Manager _| 5.1.1.0 - 5.1.1.4| PJ45077| 5.1.1.4-ICM-IF001or later versions

Workarounds and Mitigations

The Apache Commons FileUpload jar file, which is installed by IBM Case Manager (ICM), can be manually updated to the latest version to mitigate the security vulnerability.

Below are the manual instructions on how to update the Apache Common FileUpload jar file with the respective ICM releases.

  1. Download the new Apache Commons FileUpload binary from Apache:

<https://commons.apache.org/proper/commons-fileupload/download_fileupload.cgi&gt;

  1. Extract the contents and locate the commons-fileupload-1.3.3.jar file.

Note: As of the writing of the security bulletin, the latest version of FileUpload is v1.3.3.

IBM Case Manager 5.1.x release

  1. Navigate to the <CaseManagement Install Folder>\CaseWidgets\CaseForms\WEB-INF\lib

  2. Backup and remove the current commons-fileupload-1.xx.jar

  3. Copy the new common-fileupload-1.3.3.jar file into the folder

  4. Run Case Manager Admin Client (CMAC), and open an existing profile

  5. Run the ‘Deploy the Forms Application’ task.

  6. Restart the application server

IBM Case Manager 5.2.x release

  1. Navigate to the <CaseManagement Install Folder>\configure\exploded_apps\forms\WEB-INF\lib

  2. Backup and remove the current commons-fileupload-1.xx.jar

  3. Copy the new common-fileupload-1.3.3.jar file into the folder

  4. Run Case Manager configuration tool, and open an existing profile

  5. Run the following tasks

  • Create Case Manager Application
  • Deploy the Forms Application
  1. Restart the application server

IBM Case Manager 5.3.x release

  1. Navigate to the <CaseManagement Install Folder>\configure\exploded_apps\forms\WEB-INF\lib

  2. Backup and remove the current commons-fileupload-1.xx.jar

  3. Copy the new common-fileupload-1.3.3.jar file into the folder

  4. Run Case Manager configuration tool, and open an existing profile

  5. Run the following tasks

  • Create Case Manager Applications
  • Deploy the Forms Application
  1. Restart the application server

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P