Lucene search

K
ibmIBM66A485C8C750BA447B0277E03B889FAA30C3EED364C64685D096A3FFBC1D6EAC
HistorySep 25, 2022 - 9:06 p.m.

Security Bulletin: WebSphere Application Server Community Edition 3.0.0.3 RMI classloader exposure

2022-09-2521:06:56
www.ibm.com
7

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.006 Low

EPSS

Percentile

78.5%

Abstract

A problem in the RMI classloader may enable an attacker to send a serializated object via JMX that could compromise the system.

Content

Vulnerability Details
A specially crafted serialized object sent via the JMX connector could compromise the system due to a misconfigured RMI classloader.

CVEID : CVE-2013-1777
CVSS Base Score : 10
CVSS Temporal Score : See <https://exchange.xforce.ibmcloud.com/vulnerabilities/82268&gt; for the current score
CVSS Environmental Score *: Undefined
CVSS Vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C)

Affected Products And Versions
WebSphere Application Server Community Edition 3.0.0.3

Remediation
Upgrade WebSphere Application Server Community Edition server to version 3.0.0.4.
Or follow the instruction bellow to fix this issue in WebSphere Application Server Community Edition 3.0.0.3.

1. Download the patch file:JMXConnecterPatch.zip

2. Unzip the attached file into the WebSphere Application Server Community Edition installation directory, and ensure the files listed in the zip file to replace the ones in the server installation.

3. Start the server with the cache cleaned, for example,

<WAS_CE_HOME>\bin\startup -c

<WAS_CE_HOME>/bin/startup.sh -c

Mitigation
To prevent remote exploits hide the naming(1099) and JMX(9999) ports behind a firewall or bind them to a local network interface.

References:

Related Information
IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog

_*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Flash. _

_Note: _According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an “industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response.” IBM PROVIDES THE CVSS SCORES “AS IS” WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY

[{“Product”:{“code”:“SS6JMN”,“label”:“WebSphere Application Server Community Edition”},“Business Unit”:{“code”:“BU059”,“label”:“IBM Software w/o TPS”},“Component”:“–”,“Platform”:[{“code”:“PF002”,“label”:“AIX”},{“code”:“PF016”,“label”:“Linux”},{“code”:“PF027”,“label”:“Solaris”},{“code”:“PF033”,“label”:“Windows”}],“Version”:“3.0.0.3”,“Edition”:“Entry;Enhanced;Elite”,“Line of Business”:{“code”:“LOB45”,“label”:“Automation”}}]

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.006 Low

EPSS

Percentile

78.5%

Related for 66A485C8C750BA447B0277E03B889FAA30C3EED364C64685D096A3FFBC1D6EAC