Lucene search

K
ibmIBM972E571BB789B10A9DE207CA7410CB0FAEF5A0C874EA32CFB1B0D244325ED1D0
HistoryApr 10, 2024 - 8:53 p.m.

Security Bulletin: IBM Sterling File Gateway is vulnerable to cross-site scripting (CVE-2023-47714)

2024-04-1020:53:53
www.ibm.com
10
ibm sterling file gateway
cross-site scripting
vulnerability
fix
b2bi 6.1.2.5
b2bi 6.2.0.1

4.8 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N

6.2 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

Summary

This bulletin identifies the steps to take to address a cross-site scripting vulnerability in IBM Sterling File Gateway.

Vulnerability Details

CVEID:CVE-2023-47714
**DESCRIPTION:**IBM Sterling File Gateway is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
CVSS Base score: 4.8
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/271531 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N)

Affected Products and Versions

Affected Product(s) Version(s)
IBM Sterling File Gateway 6.0.0.0 - 6.0.3.9
IBM Sterling File Gateway 6.1.0.0 - 6.1.2.3
IBM Sterling File Gateway 6.2.0.0

Remediation/Fixes

IBM strongly recommends addressing the vulnerability now.

Product Version APAR Remediation & Fix
IBM Sterling File Gateway 6.0.0.0 - 6.0.3.9 IT44899 Apply B2BI 6.1.2.5 or 6.2.0.1
IBM Sterling File Gateway 6.1.0.0 - 6.1.2.3 IT44899 Apply B2BI 6.1.2.5 or 6.2.0.1
IBM Sterling File Gateway 6.2.0.0 IT44899 Apply B2BI 6.2.0.1

The IIM versions of 6.1.2.5 and 6.2.0.1 are available on Fix Central.

The container version of 6.1.2.5 and 6.2.0.1 are available in IBM Entitled Registry.

Workarounds and Mitigations

None

Affected configurations

Vulners
Node
ibmsterling_file_gatewayMatch6.0.0.0
OR
ibmsterling_file_gatewayMatch6.2.0.1

4.8 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N

6.2 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

Related for 972E571BB789B10A9DE207CA7410CB0FAEF5A0C874EA32CFB1B0D244325ED1D0