Lucene search

K
ibmIBMAA01F777015DF1C2CDF708894EB9EAD6AAB2C5B7D7053C2BB6F4CF568938E8D1
HistoryJul 06, 2022 - 6:02 p.m.

Security Bulletin: IBM Engineering Lifecycle Management is vulnerable to HTML injection.(CVE-2021-20543)

2022-07-0618:02:08
www.ibm.com
33

3.5 Low

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:S/C:N/I:P/A:N

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

0.001 Low

EPSS

Percentile

29.1%

Summary

Summary guidance: The Jazz Team Server allows administrators to install custom process templates. These custom templates can optionally have custom (HTML or JavaScript) code in them. This is a feature that many customers use, but it is not without risk. We strongly encourage administrators to only install custom process templates after a thorough review of the code changes and that they come from a trusted source. Failure to exercise caution can leave the server vulnerable to HTML injection an attack that is similar to Cross-site Scripting (XSS). While in the XSS vulnerability the attacker can inject and execute JavaScript code, the HTML injection attack only allows the injection of certain HTML tags. When an application does not properly handle user-supplied data, an attacker can supply valid HTML code, typically via a parameter value, and inject their own content into the page. This attack is typically used in conjunction with some form of social engineering, as the attack is exploiting a code-based vulnerability and a user’s trust. We have added the following reminder/warning message when uploading custom process templates: “Ensure that the process template that you uploaded is from a trusted source.”

Vulnerability Details

CVEID:CVE-2021-20543
**DESCRIPTION:**IBM Jazz Foundation is vulnerable to HTML injection. A remote attacker could inject malicious HTML code, which when viewed, would be executed in the victim’s Web browser within the security context of the hosting site.
CVSS Base score: 5.4
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/198929 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N)

Affected Products and Versions

Affected Products/Versions guidance:

Affected Product(s)|**Version(s)
**
—|—
Jazz Team Server| 6.0.6, 6.0.6.1, 7.0, 7.0.1, 7.0.2

Remediation/Fixes

Remediation/Fixes guidance:

IBM strongly recommends addressing the vulnerability now.

Product(s) **Version(s) number and/or range ** Remediation/Fix/Instructions
Jazz Team Server 6.0.6 Download and install iFix026 or later
Jazz Team Server 6.0.6.1 Download and install iFix025 or later
Jazz Team Server 7.0 Download and install iFix015 or later
Jazz Team Server 7.0.1 Download and install iFix017 or later
Jazz Team Server 7.0.2 Download and install iFix013 or later

Workarounds and Mitigations

None

Affected configurations

Vulners
Node
ibmengineering_lifecycle_managementMatch6.0.6
OR
ibmengineering_lifecycle_managementMatch6.0.6.1
OR
ibmengineering_lifecycle_managementMatch7.0
OR
ibmengineering_lifecycle_managementMatch7.0.1
OR
ibmengineering_lifecycle_managementMatch7.0.2

3.5 Low

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:S/C:N/I:P/A:N

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

0.001 Low

EPSS

Percentile

29.1%

Related for AA01F777015DF1C2CDF708894EB9EAD6AAB2C5B7D7053C2BB6F4CF568938E8D1