Lucene search

K
ibmIBM6A039724B7EB96AC81BB63AD7246EC39438370B1FB040E4251AB7E7DCC2A7AF5
HistorySep 16, 2020 - 4:02 p.m.

Security Bulletin: [All] Python (Publicly disclosed vulnerability)

2020-09-1616:02:03
www.ibm.com
41

EPSS

0.004

Percentile

72.8%

Summary

Vulnerabilities in Open Source Python affect IBM Tivoli Application Dependency Discovery Manager.

Vulnerability Details

CVEID:CVE-2019-9948
**DESCRIPTION:**Python could allow a remote attacker to bypass security restrictions, caused by improper input validation by the urllib. By sending a specially-crafted request, an attacker could exploit this vulnerability to bypass the blocklist file: URIs protection mechanisms.
CVSS Base score: 5.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/158831 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)

CVEID:CVE-2019-9947
**DESCRIPTION:**Python is vulnerable to HTTP header injection, caused by improper validation of input in urllib and urllib2. By persuading a victim to visit a specially-crafted Web page, a remote attacker could exploit this vulnerability to inject arbitrary HTTP headers, which will allow the attacker to conduct various attacks against the vulnerable system, including cross-site scripting, cache poisoning or session hijacking.
CVSS Base score: 6.1
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/158830 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)

Affected Products and Versions

Affected Product(s) Version(s)
IBM Tivoli Application Dependency Discovery Manager 7.3.0

Remediation/Fixes

Fix VRMF APAR How to acquire fix
efix_jython21_253_CVE-2019-9948_FP6190313.zip 7.3.0.6 None eFix

Note: The eFix provided for 7.3.0.6 has been tested to work successfully on all the FixPacks above FP3 (i.e. FixPack 3 - FixPack 7)

Workarounds and Mitigations

The above eFixe(s) for the respective FixPack(s) can be downloaded and applied directly.