Lucene search

K
ibmIBM8021D28506E3D05512FCE76E5FED31206F36B545805A5C17BB381831B258DAD6
HistorySep 26, 2022 - 5:45 a.m.

Security Bulletin: IBM Tivoli Monitoring Portal Browser Client (CVE-2013-0576)

2022-09-2605:45:55
www.ibm.com
6
ibm tivoli monitoring
portal browser client
xss vulnerability
cross site scripting
version 6.2.0
version 6.2.2
version 6.2.3
security bulletin

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.002 Low

EPSS

Percentile

55.2%

Abstract

A potential cross site scripting (XSS) vulnerability was found using the IBM Tivoli Enterprise Portal browser client.

Content

VULNERABILITY DETAILS:

_CVEID: _CVE-2013-0576 **DESCRIPTION: *Cross site scripting (XSS) vulnerability using Tivoli Enterprise Portal browser client.
.
CVSS:
CVSS Base Score: 4.3
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/83328&gt; for the current score
CVSS Environmental Score
: Undefined
CVSS Vector: (AV:N/AC:M/AU:N/C:N/I:P/A:N)

AFFECTED PRODUCTS AND VERSIONS:
IBM Tivoli Monitoring version 6.2.3 through 6.2.3 Fix Pack 02
IBM Tivoli Monitoring version 6.2.2 through 6.2.2 Fix Pack 09
IBM Tivoli Monitoring version 6.2.1 through 6.2.1 Fix Pack 04
IBM Tivoli Monitoring version 6.2.0 through 6.2.0 Fix Pack 03

REMEDIATION:
The recommended solution is to apply the fix for the version of IBM Tivoli Monitoring as listed below:

_Fix_* VRMF APAR How to acquire fix
6.2.2-TIV-ITM-FP0009-IV32812 6.2.2 IV32812 http://www-01.ibm.com/support/docview.wss?uid=swg24034859
6.2.3-TIV-ITM-FP0003 6.2.3 IV32812 http://www-01.ibm.com/support/docview.wss?uid=swg24033803
ITM Version 6.30 6.3.0 IV32812 Available from Passport Advantage:
6.3.0-TIV-ITM-FP0001 6.3.0.1 IV32812 http://www-01.ibm.com/support/docview.wss?uid=swg24034843

Note: Customers running on IBM Tivoli Monitoring version 6.2.0.x through 6.2.2.8 should either upgrade to 6.2.2 FP9 and install associated fix listed above to address the vulnerability, or upgrade to 6.2.3 FP3 or 6.3.0 (or later) which include the fixes for the vulnerabilities.

Workaround(s):
Use the Java Webstart client instead of the browser client.

Mitigation(s):
None.

REFERENCES:
ยท Complete CVSS Guide
ยท On-line Calculator V2_ _
ยท CVE-2013-0576
ยท _X-Force Vulnerability Database __<https://exchange.xforce.ibmcloud.com/vulnerabilities/83328&gt;_

RELATED INFORMATION:
_IBM Secure Engineering Web Portal _
IBM Product Security Incident Response Blog

ACKNOWLEDGEMENT
None.

CHANGE HISTORY
17 May 2013 Original Copy Published
23 Aug 2013 Changed โ€œor upgrade to 6.2.2 FP3โ€ to โ€œor upgrade to 6.2.3 FP3โ€

_*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Flash. _

_Note: _According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an โ€œindustry open standard designed to convey vulnerability severity and help to determine urgency and priority of response.โ€ IBM PROVIDES THE CVSS SCORES โ€œAS ISโ€ WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

[{โ€œProductโ€:{โ€œcodeโ€:โ€œSSTFXAโ€,โ€œlabelโ€:โ€œTivoli Monitoringโ€},โ€œBusiness Unitโ€:{โ€œcodeโ€:โ€œBU059โ€,โ€œlabelโ€:โ€œIBM Software w/o TPSโ€},โ€œComponentโ€:โ€œNot Applicableโ€,โ€œPlatformโ€:[{โ€œcodeโ€:โ€œPF002โ€,โ€œlabelโ€:โ€œAIXโ€},{โ€œcodeโ€:โ€œPF016โ€,โ€œlabelโ€:โ€œLinuxโ€},{โ€œcodeโ€:โ€œPF033โ€,โ€œlabelโ€:โ€œWindowsโ€}],โ€œVersionโ€:โ€œ6.2.0;6.2.1;6.2.2;6.2.3;6.3.0โ€,โ€œEditionโ€:โ€œโ€,โ€œLine of Businessโ€:{โ€œcodeโ€:โ€œLOB45โ€,โ€œlabelโ€:โ€œAutomationโ€}}]

Affected configurations

Vulners
Node
ibmtivoli_monitoringMatch6.2.0
OR
ibmtivoli_monitoringMatch6.2.1
OR
ibmtivoli_monitoringMatch6.2.2
OR
ibmtivoli_monitoringMatch6.2.3
OR
ibmtivoli_monitoringMatch6.3.0

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.002 Low

EPSS

Percentile

55.2%

Related for 8021D28506E3D05512FCE76E5FED31206F36B545805A5C17BB381831B258DAD6