Lucene search

K
ibmIBM89D3DD6725E3DAE2F079A69BFAEE087BC963C44EC043F9E16ED9A92D09393DD9
HistoryNov 02, 2023 - 11:47 a.m.

Security Bulletin: Vulnerabilities in urllib3, Python and Tornado can affect IBM Storage Protect Plus Microsoft File Systems Backup and Restore [CVE-2023-43804,CVE-2023-40217,263690]

2023-11-0211:47:18
www.ibm.com
5
ibm storage protect plus
microsoft file systems backup
urllib3
python
tornado
vulnerabilities
cve-2023-43804
cve-2023-40217
263690
sensitive information
security restrictions
web application firewall
xss attacks
remediation
fixes.

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

6.6 Medium

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

36.3%

Summary

IBM Storage Protect Plus Microsoft File Systems Backup and Restore can be affected by vulnerabilities in urllib3, Python and Tornado which include obtaining sensitive information, bypass security restrictions and bypass web application firewall protection, and conduct XSS attacks, as described by the CVEs in the โ€œVulnerability Detailsโ€ section. These vulnerabilities have been addressed.

Vulnerability Details

CVEID:CVE-2023-43804
**DESCRIPTION:**urllib3 could allow a remote authenticated attacker to obtain sensitive information, caused by a flaw with cookie request header not stripped during cross-origin redirects. By sending a specially crafted request, an attacker could exploit this vulnerability to obtain sensitive information, and use this information to launch further attacks against the affected system.
CVSS Base score: 5.9
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/268192 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N)

CVEID:CVE-2023-40217
**DESCRIPTION:**Python could allow a remote attacker to bypass security restrictions, caused by a race condition in the SSLSocket module. When the socket is closed before the TLS handshake is complete, the data is treated as if it had been encrypted by TLS. An attacker could exploit this vulnerability to bypass the TLS handshake and inject a malicious client certificate into the connection and gain access to the serverโ€™s resources without being authenticated.
CVSS Base score: 7.4
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/264374 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N)

**IBM X-Force ID:**263690
**DESCRIPTION:**Tornado Web Server is vulnerable to HTTP request smuggling, caused by improper parsing of the HTTP Content-Length header. By sending a specially crafted HTTP(S) Content-Length header, an attacker could exploit this vulnerability to poison the web cache, bypass web application firewall protection, and conduct XSS attacks.
CVSS Base score: 6.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/263690 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)

Affected Products and Versions

Affected Product(s) Version(s)
IBM Spectrum Protect Plus File Systems Agent 10.1.6 - 10.1.14
IBM Storage Protect Plus File Systems Agent 10.1.15

Remediation/Fixes

IBM Storage Protect****Plus Affected Versions **Fixing **Level Platform Link to Fix and Instructions
10.1.6-10.1.15 10.1.15.3 Windows <https://www.ibm.com/support/pages/node/6988945&gt;

Workarounds and Mitigations

None

Affected configurations

Vulners
Node
ibmstorage_protect_plusMatch10.1.6
OR
ibmstorage_protect_plusMatch10.1.7
OR
ibmstorage_protect_plusMatch10.1.8
OR
ibmstorage_protect_plusMatch10.1.9
OR
ibmstorage_protect_plusMatch10.1.10
OR
ibmstorage_protect_plusMatch10.1.11
OR
ibmstorage_protect_plusMatch10.1.13
OR
ibmstorage_protect_plusMatch10.1.14
OR
ibmstorage_protect_plusMatch10.1.15
OR
ibmstorage_protect_plusMatch10.1.15.1
OR
ibmstorage_protect_plusMatch10.1.15.2

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

6.6 Medium

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

36.3%