Lucene search

K
ibmIBM7B378047A243DA319C87D4F0917A6210B55F6446843980F55BE6ACE0460C4113
HistoryAug 11, 2022 - 10:34 a.m.

Security Bulletin: Automation Assets in IBM Cloud Pak for Integration is vulnerable to remote code execution due to ejs [CVE-2022-29078]

2022-08-1110:34:43
www.ibm.com
13

0.353 Low

EPSS

Percentile

97.1%

Summary

Automation Assets in IBM Cloud Pak for Integration is vulnerable to remote code execution due to ejs [CVE-2022-29078] with details below

Vulnerability Details

CVEID:CVE-2022-29078
**DESCRIPTION:**Node.js ejs module could allow a remote attacker to execute arbitrary code on the system, caused by a server-side template injection flaw in settings[view options][outputFunctionName]. By sending a specially-crafted HTTP request to overwrites the outputFunctionName option with an arbitrary OS command, an attacker could exploit this vulnerability to execute arbitrary code on the system.
CVSS Base score: 9.8
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/225116 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

Affected Products and Versions

Affected Product(s) Version(s)
Automation Assets in IBM Cloud Pak for Integration (CP4I) 2020.4.1
2021.1.1
2021.2.1
2021.4.1

Remediation/Fixes

Asset Repository version 2020.4.1 in IBM Cloud Pak for Integration

Upgrade Asset Repository to 2020.4.1-7-eus using the Operator upgrade process described in the IBM Documentation

<https://www.ibm.com/docs/en/cloud-paks/cp-integration/2020.4?topic=components-upgrading-asset-repository&gt;

Asset Repository version 2021.1, 2021.2, or 2021.4 in IBM Cloud Pak for Integration

Upgrade Asset Repository to 2022.2.1-0 using the Operator upgrade process described in the IBM Documentation

<https://www.ibm.com/docs/en/cloud-paks/cp-integration/2022.2?topic=capabilities-upgrading-automation-assets&gt;

Workarounds and Mitigations

None

0.353 Low

EPSS

Percentile

97.1%