Lucene search

K
ibmIBM7EDB94BFBB09B175B9D9EB0AAAAB691B264C9156774980A04507F74668F108C9
HistoryOct 23, 2018 - 5:25 p.m.

Security Bulletin: Rational DOORS Web Access is affected by Apache Tomcat vulnerabilities

2018-10-2317:25:01
www.ibm.com
15

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

Summary

Rational DOORS Web Access has addressed the following vulnerabilities.

Vulnerability Details

CVEID:CVE-2018-8034
DESCRIPTION: Apache Tomcat could allow a remote attacker to bypass security restrictions, caused by a missing host name verification when using TLS with the WebSocket client. An attacker could exploit this vulnerability to bypass security constraints to access restricted resources.
CVSS Base Score: 3.7
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/147211&gt; for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N)

CVEID:CVE-2018-11784
DESCRIPTION: Apache Tomcat could allow a remote attacker to conduct phishing attacks, caused by an open redirect vulnerability in the default servlet. An attacker could exploit this vulnerability using a specially-crafted URL to redirect a victim to arbitrary Web sites.
CVSS Base Score: 7.4
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/150860&gt; for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N)

Affected Products and Versions

Rational DOORS Web Access: 9.5.0 - 9.5.0.8
Rational DOORS Web Access: 9.5.1 - 9.5.1.10
Rational DOORS Web Access: 9.5.2 - 9.5.2.9
Rational DOORS Web Access: 9.6.0 - 9.6.0.8
Rational DOORS Web Access: 9.6.1 - 9.6.1.11

Remediation/Fixes

Upgrade to the version of Apache Tomcat shown in the table below. You can upgrade Apache Tomcat after installing Rational DOORS Web Access.

The following table presents Rational DOORS Web Access versions and the released versions of Apache Tomcat.

Rational DOORS Web Access Apache Tomcat
9.5.0 - 9.5.0.8 7.0.91
9.5.1 - 9.5.1.10 7.0.91
9.5.2 - 9.5.2.9 7.0.91
9.6.0 - 9.6.0.8 7.0.91
9.6.1 - 9.6.1.11 7.0.91

For versions of Rational DOORS Web Access that are earlier than version 9.5.0.x, IBM recommends upgrading to a fixed, supported version/release/platform of the product.

Procedure:

  1. Download the required version of Apache Tomcat or later core zip file from the Apache or Tomcat 7 Archive download site. For example:
    apache-tomcat-7.0.91-windows-x64.zip
    apache-tomcat-7.0.91-windows-x86.zip
    apache-tomcat-7.0.91.tar.gz

  2. Go to the Rational DOORS Web Access installation directory.
    For example:
    C:\Program Files\IBM\Rational\DOORS Web Access\9.version

  3. Rename the server directory toserver.orig.

  4. Extract the downloaded Apache Tomcat core compressed file to ./server in the Rational DOORS Web Access installation directory.

  5. Delete the contents of the ./server/webapps folder

  6. Copy the following jar files from your ./server.orig/lib directory to**./server/lib**
    commons-logging-1.1.x.jar
    dwa-catalina.jar
    log4j-1.2.x.jar
    log4j.properties

  7. Remove the following jar files from the ./server/lib directory
    tomcat7-websocket.jar
    websocket-api.jar

  8. Copy your ./server.orig/festival directory to**./server/festival**.

  9. Copy the ./server.orig/conf/server.xml file to**./server/conf/server.xml**.

  10. Copy ./server.orig/webapps/*.war to**./server/webapps**.

  11. Optional: Copy any customized files from the**./server.origdirectory to./server**.

  12. UNIX systems only: Run the**./configure-festival.sh** command, as described in the help topic Installing the web access server and the web access broker on Linux or Solaris systems.

Workarounds and Mitigations

None

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N