Lucene search

K
ibmIBM71763DB8BA3B87C5175E4ED1BF88B5F20D4D7107BB02006612C8229371E7C9F4
HistoryJun 16, 2018 - 8:09 p.m.

Security Bulletin: IBM Sterling Order Management is affected by a vulnerability (CVE-2017-5638)

2018-06-1620:09:19
www.ibm.com
18

10 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

Summary

IBM Sterling Order Management use Apache Struts 2 and is affected by some of the vulnerabilities that exist in Apache Struts 2

Vulnerability Details

CVEID: CVE-2017-5638 DESCRIPTION: Apache Struts could allow a remote attacker to execute arbitrary code on the system, caused by an error when performing a file upload based on Jakarta Multipart parser. An attacker could exploit this vulnerability using a malicious Content-Type value to execute arbitrary code on the system.
CVSS Base Score: 7.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/122776 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)

Affected Products and Versions

IBM Sterling Selling and Fulfillment Foundation 9.1.0
IBM Sterling Selling and Fulfillment Foundation 9.2.0
IBM Sterling Selling and Fulfillment Foundation 9.2.1
IBM Sterling Selling and Fulfillment Foundation 9.3.0
IBM Sterling Selling and Fulfillment Foundation 9.4.0
IBM Sterling Selling and Fulfillment Foundation 9.5.0

Remediation/Fixes

The recommended solution is to apply the security fix pack (SFP) as soon as practical. Please see below for information about the available fixes.

Product _Security Fix Pack_* Remediation/First Fix
IBM Sterling Selling and Fulfillment Foundation 9.5.0 9.5.0-SFP2 http://www-933.ibm.com/support/fixcentral/options

Select appropriate VRMF
IBM Sterling Selling and Fulfillment Foundation 9.4.0| 9.4.0-SFP3| http://www-933.ibm.com/support/fixcentral/options

Select appropriate VRMF
IBM Sterling Selling and Fulfillment Foundation 9.3.0| 9.3.0-SFP5| http://www-933.ibm.com/support/fixcentral/options

Select appropriate VRMF
IBM Sterling Selling and Fulfillment Foundation 9.2.1| 9.2.1- SFP6| http://www-933.ibm.com/support/fixcentral/options

_Select appropriate VRMF _
IBM Sterling Selling and Fulfillment Foundation 9.2.0| 9.2.0- SFP6| http://www-933.ibm.com/support/fixcentral/options

_Select appropriate VRMF _
IBM Sterling Selling and Fulfillment Foundation 9.1.0| 9.1.0- SFP6| http://www-933.ibm.com/support/fixcentral/options

_Select appropriate VRMF _

Workarounds and Mitigations

None

10 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C