IBM Business Automation Workflow is vulnerable to a remote code execution attack.
CVEID:CVE-2021-43138
**DESCRIPTION:**Async could allow a remote attacker to execute arbitrary code on the system, caused by prototype pollution in the mapValues() method. By persuading a victim to open a specially-crafted file, an attacker could exploit this vulnerability to execute arbitrary code on the system.
CVSS Base score: 7.8
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/223605 for the current score.
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)
Affected Product(s) | Version(s) | Status |
---|---|---|
IBM Business Automation Workflow traditional | V22.0.1 | not affected |
IBM Business Automation Workflow containers | V22.0.1 | not affected |
IBM Business Automation Workflow traditional | V21.0.3 | |
V21.0.2 | affected | |
IBM Business Automation Workflow containers | V21.0.3 | |
V21.0.2 | affected | |
IBM Business Automation Workflow traditional | V21.0.1 | |
V20.0.0.1 - V20.0.0.2 | ||
V19.0.0.1 - V19.0.0.3 | ||
V18.0.0.0 - V18.0.0.1 | not affected | |
IBM Business Automation Workflow containers | V21.0.1 | |
V20.0.0.1 - V20.0.0.2 | not affected |
The recommended solution is to apply the Interim Fix (iFix) or Cumulative Fix (CF) containing APAR JR64868 as soon as practical.
Affected Product(s) | Version(s) | Remediation / Fix |
---|---|---|
IBM Business Automation Workflow traditional | V21.0.3 | Apply JR64868 or upgrade to IBM Business Automation Workflow 22.0.1 |
IBM Business Automation Workflow Containers | V21.0.3 | Apply 21.0.3-IF010 or upgrade to IBM Business Automation Workflow 22.0.1 |
IBM Business Automation Workflow traditional | V21.0.2 | Apply JR64868 or upgrade to IBM Business Automation Workflow 22.0.1 |
IBM Business Automation Workflow Containers | V21.0.2 | Apply 21.0.2-IF012 or upgrade to IBM Business Automation Workflow 22.0.1 |
None