Lucene search

K
ibmIBMAAC24A1DC4CC424B974BAE4B8C5E46B80DE2B79BE9622BA91AF2FC02770A13C7
HistoryJul 12, 2018 - 8:31 p.m.

Security Bulletin: Information disclosure in Liberty for Java for IBM Cloud (CVE-2018-1553)

2018-07-1220:31:14
www.ibm.com
12

EPSS

0.002

Percentile

57.2%

Summary

There is an information disclosure in WebSphere Application Server Liberty using the SAML Web SSO feature.

Vulnerability Details

CVEID: CVE-2018-1553 DESCRIPTION: IBM WebSphere Application Server Liberty could allow a remote attacker to obtain sensitive information, caused by mishandling of exceptions by the SAML Web SSO feature.
CVSS Base Score: 5.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/142890 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)

Affected Products and Versions

This vulnerability affects all versions of Liberty for Java in IBM Cloud up to and including v3.22.

Remediation/Fixes

To upgrade to Liberty for Java v3.23-20180628-1052 or higher, you must re-stage or re-push your application.

To find the current version of Liberty for Java in IBM Cloud being used, from the command-line Cloud Foundry client by running the following commands:

cf ssh <appname> -c cat “staging_info.yml”

Look for the following lines:

{“detected_buildpack”:“Liberty for Java™ (WAR, liberty-18.0.0_1, buildpack-v3.22-20180601-1200, ibmjdk-1.8.0_20180214, env)”,“start_command”:“.liberty/initial_startup.rb”}

To re-stage your application using the command-line Cloud Foundry client, use the following command:

cf restage <appname>

To re-push your application using the command-line Cloud Foundry client, use the following command:

cf push <appname>

Workarounds and Mitigations

none

Monitor IBM Cloud Status for Future Security Bulletins

Monitor the security notifications on the IBM Cloud Status page to be advised of future security bulletins.

References

Complete CVSS v3 Guide
On-line Calculator v3

Off

Related Information

IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog

Change History

12 July 2018: original document published

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer

Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.

[{“Business Unit”:{“code”:“BU053”,“label”:“Cloud & Data Platform”},“Product”:{“code”:“SS4JBE”,“label”:“Liberty for Java for IBM Cloud”},“Component”:“”,“Platform”:[{“code”:“PF016”,“label”:“Linux”}],“Version”:“All Versions”,“Edition”:“”,“Line of Business”:{“code”:“LOB21”,“label”:“Public Cloud Platform”}}]

EPSS

0.002

Percentile

57.2%

Related for AAC24A1DC4CC424B974BAE4B8C5E46B80DE2B79BE9622BA91AF2FC02770A13C7