Lucene search

K
ibmIBM6A665BFE089E6915405804A36BDD124C8C3A870E3C583D6B77300AC4A3A92AE5
HistoryNov 28, 2022 - 4:28 p.m.

Security Bulletin: IBM Sterling Connect:Direct for UNIX is vulnerable to remote code execution due to Apache Commons Text [CVE-2022-42889]

2022-11-2816:28:57
www.ibm.com
27
ibm sterling connect:direct for unix
remote code execution
apache commons text
cve-2022-42889
vulnerability
upgrade

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

10

Confidence

High

EPSS

0.971

Percentile

99.8%

Summary

IBM Sterling Connect:Direct for UNIX components Install Agent and File Agent are vulnerable to remote code execution due to Apache Commons Text [CVE-2022-42889]. Apache Commons Text has been upgraded to version 1.10.0 in IBM Sterling Connect:Direct for UNIX Install Agent and File Agent.

Vulnerability Details

**CVEID:**CVE-2022-42889 DESCRIPTION: Apache Commons Text could allow a remote attacker to execute arbitrary code on the system, caused by an insecure interpolation defaults flaw. By sending a specially-crafted input, an attacker could exploit this vulnerability to execute arbitrary code on the system.
CVSS Base score: 9.8
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/238560 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

Affected Products and Versions

Affected Product(s) Version(s)
IBM Sterling Connect:Direct for UNIX 6.2.0.0 - 6.2.0.5.iFix003
IBM Sterling Connect:Direct for UNIX 6.1.0.0 - 6.1.0.4.iFix068
IBM Sterling Connect:Direct for UNIX 6.0.0.0 - 6.0.0.2.iFix138
IBM Sterling Connect:Direct for UNIX 4.3.0.0 - 4.3.0.1.iFix102

Remediation/Fixes

IBM strongly recommends addressing the vulnerability now by upgrading

Product Version Remediation/Fix/Instructions
IBM Sterling Connect:Direct for UNIX 6.2.0 Apply 6.2.0.5.iFix004, available on Fix Central.
IBM Sterling Connect:Direct for UNIX 6.1.0 Apply 6.1.0.4.iFix069, available on Fix Central.
IBM Sterling Connect:Direct for UNIX 6.0.0 Apply 6.0.0.2.iFix139, available on Fix Central.
IBM Sterling Connect:Direct for UNIX 4.3.0 Apply 4.3.0.1.iFix103, available on Fix Central.

Workarounds and Mitigations

None

Affected configurations

Vulners
Node
ibmsterling_connect\Matchdirect_for_unix6.2.0
OR
ibmsterling_connect\Matchdirect_for_unix6.1.0
OR
ibmsterling_connect\Matchdirect_for_unix6.0.0
OR
ibmsterling_connect\Matchdirect_for_unix4.3.0
VendorProductVersionCPE
ibmsterling_connect\direct_for_unixcpe:2.3:a:ibm:sterling_connect\:direct_for_unix:6.2.0:*:*:*:*:*:*:*
ibmsterling_connect\direct_for_unixcpe:2.3:a:ibm:sterling_connect\:direct_for_unix:6.1.0:*:*:*:*:*:*:*
ibmsterling_connect\direct_for_unixcpe:2.3:a:ibm:sterling_connect\:direct_for_unix:6.0.0:*:*:*:*:*:*:*
ibmsterling_connect\direct_for_unixcpe:2.3:a:ibm:sterling_connect\:direct_for_unix:4.3.0:*:*:*:*:*:*:*

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

10

Confidence

High

EPSS

0.971

Percentile

99.8%