Lucene search

K
ibmIBMADC50833DE0A3D841EF5E4556B1E32AF2826952FD359D02B27840B2DAC3F23C7
HistoryJun 15, 2018 - 10:37 p.m.

Security Bulletin: Vulnerability in RC4 stream cipher affects OpenPages GRC Platform with Application Server (CVE-2015-2808)

2018-06-1522:37:00
www.ibm.com
3

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

Summary

The RC4 “Bar Mitzvah” Attack for SSL/TLS affects OpenPages GRC Platform with Application Server.

Vulnerability Details

CVEID: CVE-2015-2808 DESCRIPTION: The RC4 algorithm, as used in the TLS protocol and SSL protocol, could allow a remote attacker to obtain sensitive information. An attacker could exploit this vulnerability to remotely expose account credentials without requiring an active man-in-the-middle session. Successful exploitation could allow an attacker to retrieve credit card data or other sensitive information. This vulnerability is commonly referred to as “Bar Mitzvah Attack”.
CVSS Base Score: 5
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/101851 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N)

Affected Products and Versions

OpenPages GRC Platform with Application Server 6.2.0, 6.2.1, 7.0 (embedded application server versions)

Remediation/Fixes

None

Workarounds and Mitigations

The embedded application server can be reconfigured to only accept known good ciphers and avoid this issue. Please note that this remediation changes the list of cipher suites accepted by the application server. As a result, there is a chance SSL connectivity issues could arise in your environment . While no issues have been found in internal testing, we encourage you to test this configuration on a test system in your environment prior to using it in production.

Mitigation Steps:

  1. Stop all servers. For details on stopping services, see the “Starting and Stopping Servers” chapter in the IBM® OpenPages® GRC Platform Administrator’s Guide.
  2. Log into the Windows console of the primary application server as an administrator.
  3. Launch regedit.exe
  4. Navigate to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\OpenPagesAdminServer\Parameters
  5. Right-click on the Parameters key and select Export.
  6. Create a backup directory (you will be repeating this export with other keys).
  7. Save the export as OpenPagesAdminServer
  8. Select the current value for CmdLine
  9. Paste it into a text editor such as Notepad
  10. Move to the very end of the string and you will find the text “weblogic.Server”
  11. Insert the string “-Dweblogic.security.SSL.protocolVersion=TLS1” before “weblogic.Server”.

For example, change:

-Djava.security.policy=“C:\oracle\middleware\wlserver_10.3\server\lib\weblogic.policy” weblogic.Server

to:

-Djava.security.policy=“C:\oracle\middleware\wlserver_10.3\server\lib\weblogic.policy” -Dweblogic.security.SSL.protocolVersion=TLS1 weblogic.Server

  1. Copy the string from your editor and use it to replace the current contents of the CmdLine setting.
  2. Navigate to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\OpenPagesServer1\Parameters
  3. Right-click on the Parameters key and select Export.
  4. Save the export as OpenPagesServer1 in the backup directory
  5. Repeat steps 8 through 12 for this key.
  6. If you have additional node installed (for example OpenPagesServer2) repeat the process of exporting and adding “-Dweblogic.security.SSL.protocolVersion=TLS1” for each node.
  7. Repeat the process for the workflow servers by editing:
    - HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\InterstageBPMAdminServer\Parameters
    - HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\InterstageBPMCS1\Parameters
    - Any additional nodes installed (i.e. InterstageBPMCS2)
  8. Close Registry Editor
  9. Navigate to the file <OpenPages_Home>\OpenPagesDomain\config\config.xml

For example:

C:\OpenPages\OpenPagesDomain\config\config.xml

  1. Make a backup copy of the file
  2. Edit the file in Notepad of similar text editor.
  3. Locate the following section:

<server>
<name>OpenPagesAdminServer</name>
<ssl>
<name>OpenPagesAdminServer</name>
<enabled>true</enabled>

  1. Add the following below the <enabled>true</enabled> line:

<ciphersuite>TLS_RSA_WITH_AES_128_CBC_SHA</ciphersuite>
<jsse-enabled>true</jsse-enabled>

  1. Look further down the file for the section:

<server>
<name>ServerName-OpenPagesServer1</name>
<max-message-size>2000000000</max-message-size>
<ssl>
<enabled>true</enabled>

  1. Add the following below the <enabled>true</enabled> line:

<ciphersuite>TLS_RSA_WITH_AES_128_CBC_SHA</ciphersuite>

  1. In the same <ssl> block, add <enabled>true</enabled> just before the closing </ssl>. Your <ssl> block should now look something like the following:

<ssl>
<enabled>true</enabled>
<ciphersuite>TLS_RSA_WITH_AES_128_CBC_SHA</ciphersuite>
<listen-port>7010</listen-port>
<server-private-key-alias>mystrongcert</server-private-key-alias>
<server-private-key-pass-phrase-encrypted>{AES}123456abce=</server-private-key-pass-phrase-encrypted>
<jsse-enabled>true</jsse-enabled>
</ssl>

  1. Make the same changes to any additional nodes you have configured. (i.e. ServerName-OpenPagesServer2)
  2. Save and close config.xml
  3. Navigate to the file <Fujitsu_Home>\InterstageBPM\IBPMDomain\config\config.xml

For example:

C:\Fujitsu\InterstageBPM\IBPMDomain\config\config.xml

  1. Make a backup copy of the file
  2. Edit the file in Notepad of similar text editor.
  3. Locate the following section:

<server>
<name>AdminServer</name>
<ssl>
<name>AdminServer</name>
<enabled>true</enabled>

  1. Add the following below the <enabled>true</enabled> line:

<ciphersuite>TLS_RSA_WITH_AES_128_CBC_SHA</ciphersuite>

  1. In the same <ssl> block, add <enabled>true</enabled> just before the closing </ssl>. Your <ssl> block should now look like the following:

<ssl>
<enabled>true</enabled>
<ciphersuite>TLS_RSA_WITH_AES_128_CBC_SHA</ciphersuite>
<listen-port>49902</listen-port>
<jsse-enabled>true</jsse-enabled>
</ssl>

  1. Look further down the file for the section:

<server>
<name>ServerName-InterstageBPMCS1</name>
<max-message-size>2000000000</max-message-size>
<ssl>
<enabled>true</enabled>

  1. Add the following below the <enabled>true</enabled> line:

<ciphersuite>TLS_RSA_WITH_AES_128_CBC_SHA</ciphersuite>

  1. In the same <ssl> block, add <enabled>true</enabled> just before the closing </ssl>. Your <ssl> block should now look something like the following:

<ssl>
<enabled>true</enabled>
<ciphersuite>TLS_RSA_WITH_AES_128_CBC_SHA</ciphersuite>
<listen-port>49952</listen-port>
<jsse-enabled>true</jsse-enabled>
</ssl>

  1. Make the same changes to any additional nodes you have configured. (i.e. ServerName-InterstageBPMCS2)
  2. Save and close config.xml
  3. You may now restart services.
  4. Once services restart, connect to the application via secure connection to validate that you can connect.

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

Related for ADC50833DE0A3D841EF5E4556B1E32AF2826952FD359D02B27840B2DAC3F23C7