Lucene search

K
ibmIBMC3ED50A7089DB65806C3308A7815D13950B391B7C8DBE9137E0C325961F03860
HistoryMay 03, 2023 - 4:27 p.m.

Security Bulletin: AIX is vulnerable to HTTP request smuggling due to Perl (CVE-2022-31081)

2023-05-0316:27:57
www.ibm.com
46
vulnerability
perl
http request smuggling
web cache
firewall bypass
xss attacks
aix
vios
version 7.1
version 7.2
version 7.3
vios 3.1

CVSS2

6.4

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:P/A:N

CVSS3

7.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

EPSS

0.003

Percentile

65.7%

Summary

A vulnerability in libwww-perl could allow an attacker to poison web caches, bypass web application firewall protection, and conduct XSS attacks (CVE-2022-31081). AIX uses Perl in various operating system components.

Vulnerability Details

CVEID:CVE-2022-31081
**DESCRIPTION:**Libwww is vulnerable to HTTP request smuggling, caused by an unspecified flaw. By sending a specially-crafted HTTP(S) transfer-encoding request header, an attacker could exploit this vulnerability to poison the web cache, bypass web application firewall protection, and conduct XSS attacks.
CVSS Base score: 7.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/229880 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)

Affected Products and Versions

Affected Product(s) Version(s)
AIX 7.1
AIX 7.2
AIX 7.3
VIOS 3.1

The following fileset levels are vulnerable:

Fileset Lower Level Upper Level
perl.rte 5.28.0.0 5.28.1.4
perl.rte 5.34.0.0 5.34.1.1

To find out whether the affected filesets are installed on your systems, refer to the lslpp command found in AIX user’s guide.

Example: lslpp -L | grep -i perl.rte

Remediation/Fixes

FIXES

IBM strongly recommends addressing the vulnerability now.

AIX and VIOS fixes are available.

The AIX and VIOS fixes can be downloaded via https from, under ‘Perl - Perl Version 5 Runtime’:

<https://www.ibm.com/resources/mrs/assets?source=aixbp&gt;

For AIX 7.1 TL5, 7.2 TL5, and 7.3 TL0, and for VIOS 3.1.2, 3.1.3, and 3.1.4:

perl.rte.5.28.1.5

For AIX 7.3 TL1:

perl.rte.5.34.1.2

Verify you have retrieved the fixes intact:

The checksums below were generated using the “openssl dgst -sha256 [filename]” command as the following:

openssl dgst -sha256 filename
48d2ae8e064e5dab009b7292ba1687428d790edfa5ff897cebc0ec0e2c30b948 perl.rte.5.28.1.5
60559c203b2cbd1c9a3a11df82059ef59bb52edf29a3ca4d8e59a22b1664511c perl.rte.5.34.1.2

IMPORTANT: If possible, it is recommended that a mksysb backup of the system be created. Verify it is both bootable and readable before proceeding.

To preview the fix installation:

installp -apYd . perl

To install the fix package:

installp -aXYd . perl

CONTACT US

For information on how to securely verify AIX security bulletins and fixes:

<https://www.ibm.com/support/pages/node/6985269&gt;

To obtain the OpenSSL public key that can be used to verify the signed advisory, download the key from our web page:

ftp://ftp.software.ibm.com/systems/power/AIX/systems_p_os_aix_security_pubkey.txt

<https://aix.software.ibm.com/aix/efixes/security/systems_p_os_aix_security_pubkey.txt&gt;

To verify the AIX/VIOS security bulletin:

Published advisory OpenSSL signature file location: <https://aix.software.ibm.com/aix/efixes/security/perl_advisory6.asc.sig&gt;

openssl dgst -sha256 -verify [pubkey_file] -signature [advisory_file].sig [advisory_file]

Please contact your local IBM AIX support center for any assistance:

<https://www.ibm.com/support&gt;

Workarounds and Mitigations

None

Affected configurations

Vulners
Node
ibmaixMatch7.1
OR
ibmaixMatch7.2
OR
ibmaixMatch7.3
OR
ibmpowervm_virtual_i\/o_serverMatch3.1
VendorProductVersionCPE
ibmaix7.1cpe:2.3:o:ibm:aix:7.1:*:*:*:*:*:*:*
ibmaix7.2cpe:2.3:o:ibm:aix:7.2:*:*:*:*:*:*:*
ibmaix7.3cpe:2.3:o:ibm:aix:7.3:*:*:*:*:*:*:*
ibmpowervm_virtual_i\/o_server3.1cpe:2.3:a:ibm:powervm_virtual_i\/o_server:3.1:*:*:*:*:*:*:*

CVSS2

6.4

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:P/A:N

CVSS3

7.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

EPSS

0.003

Percentile

65.7%