logo
DATABASE RESOURCES PRICING ABOUT US

Security Bulletin: IBM WebSphere MQ JMS client deserialization RCE vulnerability (CVE-2016-0360)

Description

## Summary A potential vulnerability exists within the JMSObjectMessage class, which IBM WebSphere MQ provides as part of its Java Message Service implementation. ## Vulnerability Details JMS Object messages depend on Java Serialization for marshalling/unmarshalling of the message payload. Deserialization of untrusted data can lead to security flaws; a remote attacker could use this to execute arbitrary code with the permissions of the application that is using a JMS ObjectMessage. Applications that consume ObjectMessage type of messages can be vulnerable as they deserialize objects on ObjectMessage.getObject() calls. Applications which call toString() on a javax.jms.Message which has an underlying type of ObjectMessage can also be vulnerable, as this method performs deserialization. The MQ classes for JMS trace will call toString() on a javax.jms.Message object, and so are also vulnerable if the underlying type is an ObjectMessage. ** ** **CVEID:** [_CVE-2016-0360_](<https://vulners.com/cve/CVE-2016-0360>)** DESCRIPTION:** IBM Websphere MQ JMS client provides classes that deserialize objects from untrusted sources which could allow a malicious user to execute arbitrary Java code by adding vulnerable classes to the classpath. CVSS Base Score: 8.1 CVSS Temporal Score: See [_https://exchange.xforce.ibmcloud.com/vulnerabilities/111930_](<https://exchange.xforce.ibmcloud.com/vulnerabilities/111930>) for the current score CVSS Environmental Score*: Undefined CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) ## Affected Products and Versions **_IBM MQ 9.0_** IBM MQ 9.0.0.0 only **_IBM WebSphere MQ 8.0_** IBM WebSphere MQ 8.0.0.0 through 8.0.0.5 maintenance levels **_IBM WebSphere MQ 7.5_** IBM WebSphere MQ 7.5.0.0 through 7.5.0.7 maintenance levels **_IBM WebSphere MQ 7.1_** IBM WebSphere MQ 7.1.0.0 through 7.1.0.8 maintenance levels **_IBM WebSphere MQ 7.0.1_** IBM WebSphere MQ 7.0.1.0 through 7.0.1.14 maintenance levels ## Remediation/Fixes **_IBM MQ 9.0 (Long Term Support)_** Apply 9.0.0.1 maintenance level when available. In the interim apply patch for APAR [IT14385](<https://www-945.ibm.com/support/fixcentral/swg/selectFixes?product=ibm%2FWebSphere%2FWebSphere+MQ&fixids=9.0.0.0-WS-MQ-JavaVM-LAIT14385&source=dbluesearch&function=fixId&parent=ibm/WebSphere>) and follow instructions in the patch readme to apply serialization allowlisting. **_IBM MQ 9.0 (Continuous Delivery)_** Serialization allowlisting is available from IBM MQ 9.0.1. Upgrade to latest version of IBM MQ and follow instructions in the IBM Knowledge Center to apply [ClassName allowlisting in JMS ObjectMessage](<http://www.ibm.com/support/knowledgecenter/SSFKSJ_9.0.0/com.ibm.mq.dev.doc/q127290_.htm>). **_IBM WebSphere MQ 8.0_** Apply [8.0.0.6](<http://www-01.ibm.com/support/docview.wss?uid=swg21995100>) maintenance level and follow instructions in the IBM Knowledge Center to apply [ClassName allowlisting in JMS ObjectMessage](<https://www.ibm.com/support/knowledgecenter/SSFKSJ_8.0.0/com.ibm.mq.dev.doc/q127290_.htm>). **_IBM WebSphere MQ 7.5_** Apply Fixpack 7.5.0.8 when available. In the interim apply patch for APAR [IT14385](<https://www-945.ibm.com/support/fixcentral/swg/selectFixes?product=ibm%2FWebSphere%2FWebSphere+MQ&fixids=7.5.0.7-WS-MQ-JavaVM-LAIT14385&source=dbluesearch&function=fixId&parent=ibm/WebSphere>) and follow instructions in the patch readme to apply serialization allowlisting. ** ****_IBM WebSphere MQ 7.1_** Apply Fixpack 7.1.0.9 when available. In the interim apply patch for APAR [IT14385](<https://www-945.ibm.com/support/fixcentral/swg/selectFixes?product=ibm%2FWebSphere%2FWebSphere+MQ&fixids=7.1.0.7-WS-MQ-JavaVM-LAIT14385&source=dbluesearch&function=fixId&parent=ibm/WebSphere>) and follow instructions in the patch readme to apply serialization allowlisting. ** ****_IBM WebSphere MQ 7.0.1_** Apply patch for APAR [IT14385](<https://www-945.ibm.com/support/fixcentral/swg/selectFixes?product=ibm%2FWebSphere%2FWebSphere+MQ&fixids=7.0.1.14-WS-MQ-JavaVM-LAIT14385&source=dbluesearch&function=fixId&parent=ibm/WebSphere>) and follow instructions in the patch readme to apply serialization allowlisting. ## Workarounds and Mitigations IBM WebSphere MQ supports Object Messages as part of the JMS specification, however ObjectMessage usage is discouraged. To mitigate this vulnerability, message types that do not contain this security flaw, such as JSON or XML, should be used. To ensure that messages come from recognised senders, a security mechanism, such as MQ's AMS (Advanced Message Security), can be used. ##


Affected Software


CPE Name Name Version
websphere mq 9.0
websphere mq 8.0
websphere mq 7.5
websphere mq 7.1
websphere mq 7.0.1

Related