Lucene search

K
ibmIBMBC2D08AB92EB4A0929E1BD453E380BC385526A320819460C279316D97CFF384C
HistoryJun 15, 2018 - 7:01 a.m.

Security Bulletin: Cross-site scripting vulnerability in IBM Business Process Manager (BPM) redirect-login mechanism (CVE-2014-6101)

2018-06-1507:01:57
www.ibm.com
9

EPSS

0.005

Percentile

76.5%

Summary

IBM Business Process Manager uses a mechanism to silently login users who have previously authenticated themselves. This mechanism is vulnerable to cross-site scripting attacks.

Vulnerability Details

CVE ID:CVE-2014-6101

**DESCRIPTION:**IBM Business Process Manager is vulnerable to cross-site scripting, which is caused by the improper validation of user-supplied input. A remote attacker might exploit this vulnerability using a specially crafted URL to execute a script in a user’s web browser within the security context of the hosting web site after the URL is clicked. An attacker might use this vulnerability to steal the user’s cookie-based authentication credentials.

CVSS Base Score: 4.3
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/96024&gt; for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N)

Affected Products and Versions

    • IBM Business Process Manager Standard V7.5.x, 8.0.x 8.5.x
  • IBM Business Process Manager Express V7.5.x, 8.0.x 8.5.x
  • IBM Business Process Manager Advanced V7.5.x, 8.0.x 8.5.x

Remediation/Fixes

Install the interim fix for APAR JR51211 as appropriate for your current IBM Business Process Manager version.
Note: IBM Business Process Manager V7.5 and 8.0 require a second interim fix: JR51507

Interim Fixes for APAR JR51211

* [_IBM Business Process Manager Express_](&lt;http://www.ibm.com/support/fixcentral/swg/quickorder?parent=ibm%7EWebSphere&product=ibm/WebSphere/IBM+Business+Process+Manager+Express&release=All&platform=All&function=aparId&apars=JR51211&source=fc&gt;)
* [_IBM Business Process Manager Standard_](&lt;http://www.ibm.com/support/fixcentral/swg/quickorder?parent=ibm%7EWebSphere&product=ibm/WebSphere/IBM+Business+Process+Manager+Standard&release=All&platform=All&function=aparId&apars=JR51211&source=fc&gt;)
* [_IBM Business Process Manager Advanced_](&lt;http://www.ibm.com/support/fixcentral/swg/quickorder?parent=ibm%7EWebSphere&product=ibm/WebSphere/IBM+Business+Process+Manager+Advanced&release=All&platform=All&function=aparId&apars=JR51211&source=fc&gt;)

Interim Fixes for APAR JR51507

* [IBM Business Process Manager Express](&lt;http://www.ibm.com/support/fixcentral/swg/quickorder?parent=ibm%7EWebSphere&product=ibm/WebSphere/IBM+Business+Process+Manager+Express&release=All&platform=All&function=aparId&apars=JR51507&source=fc&gt;)
* [IBM Business Process Manager Standard](&lt;http://www.ibm.com/support/fixcentral/swg/quickorder?parent=ibm%7EWebSphere&product=ibm/WebSphere/IBM+Business+Process+Manager+Standard&release=All&platform=All&function=aparId&apars=JR51507&source=fc&gt;)
* [IBM Business Process Manager Advanced](&lt;http://www.ibm.com/support/fixcentral/swg/quickorder?parent=ibm%7EWebSphere&product=ibm/WebSphere/IBM+Business+Process+Manager+Advanced&release=All&platform=All&function=aparId&apars=JR51507&source=fc&gt;)

Workarounds and Mitigations

The attack requires a user to access a malicious URL that the attacker has constructed for this purpose. Advise your users not to click links of unknown or untrusted origins.

EPSS

0.005

Percentile

76.5%

Related for BC2D08AB92EB4A0929E1BD453E380BC385526A320819460C279316D97CFF384C