Lucene search

K
ibmIBM9E88D161C747300B2B015CD887E79CA3404354EBFF1BEAEE5757CBE5C94000A1
HistoryDec 15, 2023 - 3:13 p.m.

Security Bulletin: Vulnerability in urllib3 affects IBM Process Mining CVE-2023-45803

2023-12-1515:13:18
www.ibm.com
10
vulnerability
urllib3
ibm process mining
cve-2023-45803
security fix
update installation
redhat openshift
information disclosure

CVSS3

4.2

Attack Vector

ADJACENT

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N

AI Score

6.6

Confidence

High

EPSS

0

Percentile

9.8%

Summary

There is a vulnerability in urllib3 that could allow an remote authenticated attacker to obtain sensitive information on the system. The code is used by IBM Process Mining. This bulletin identifies the security fixes to apply to address the vulnerability.

Vulnerability Details

CVEID:CVE-2023-45803
**DESCRIPTION:**urllib3 could allow a remote authenticated attacker to obtain sensitive information, caused by a flaw with not remove the HTTP request body when an HTTP redirect response using status 303. By sending a specially crafted HTTP request, an attacker could exploit this vulnerability to obtain sensitive information, and use this information to launch further attacks against the affected system.
CVSS Base score: 4.2
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/269079 for the current score.
CVSS Vector: (CVSS:3.0/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N)

Affected Products and Versions

Affected Product(s) Version(s)
IBM Process Mining

1.14.0, 1.14.1, 1.14.2, 1.14.2 IF001

Remediation/Fixes

Any open source library may be included in one or more sub-components of IBM Process Mining. Open source updates are not always synchronized across all components. The CVE in this bulletin are specifically addressed by

CVE/ X-Force ID Addressed in component
CVE-2023-45803 Process Mining
Product(s) **Version(s) number and/or range ** Remediation/Fix/Instructions
IBM Process Mining on RedHat OpenShift

1.14.0, 1.14.1, 1.14.2, 1.14.2 IF001

| **Install/Upgrade to version 1.14.3

Installing a Production deployment
**1.To deploy a Production deployment, see installing on
RedHat OpenShift Container Platform environments

**Upgrading an Installation **** **1.To perform an upgrade of a Production deployment, see
upgrading in RedHat OpenShift Container Platform
environments
IBM Process Mining traditional| 1.14.0, 1.14.1, 1.14.2| **Install/Upgrade to version 1.14.3

** 1.Login to PassPortAdvantage
2.Search for
M0GWBML Process Mining 1.14.3 Server Multiplatform
Multilingual
3.Download package
4.Follow install instructions
5.Repeat for M0GWCML Process Mining 1.14.3 Client
Windows Multilingual

Workarounds and Mitigations

None known

Affected configurations

Vulners
Node
ibmibm_process_miningMatch1.14.0
OR
ibmibm_process_miningMatch1.14.1
OR
ibmibm_process_miningMatch1.14.2
OR
ibmibm_process_miningMatch1.14.2
OR
ibmibm_process_miningMatch001

CVSS3

4.2

Attack Vector

ADJACENT

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N

AI Score

6.6

Confidence

High

EPSS

0

Percentile

9.8%