Lucene search

K
ibmIBMC4E538DE6D1FC1438848E978A3A25301E851E5CDF737E802CB94328FFD197389
HistoryAug 23, 2024 - 9:48 a.m.

Security Bulletin: IBM App Connect Enterprise Certified Container DesignerAuthoring operands that use mapping assistance are vulnerable to arbitrary code execution [CVE-2022-48622] [CVE-2023-23931] [CVE-2024-35195] [CVE-2024-39689]

2024-08-2309:48:01
www.ibm.com
9
ibm app connect enterprise
designerauthoring
red hat
arbitrary code execution
cve-2022-48622
cve-2023-23931
cve-2024-35195
cve-2024-39689

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

8.6

Confidence

High

EPSS

0.001

Percentile

35.7%

Summary

The IBM App Connect Enterprise Certified Container image that provides the mapping assistance capability to the DesignerAuthoring operand includes several Python based Red Hat packages that contain vulnerabilites. IBM App Connect Enterprise Certified Container DesignerAuthoring operands that use mapping assistance are vulnerable to arbitrary code execution. This bulletin provides patch information to address the reported vulnerabilities in the Red Hat packages. [CVE-2022-48622] [CVE-2023-23931] [CVE-2024-35195] [CVE-2024-39689]

Vulnerability Details

CVEID:CVE-2022-48622
**DESCRIPTION:**GNOME GdkPixbuf could allow a remote attacker to execute arbitrary code on the system, caused by a heap memory corruption in the ani_load_chunk function in io-ani.c. By persuading a victim to open a specially crafted .ani file, an attacker could exploit this vulnerability to execute arbitrary code or cause a denial of service condition on the system.
CVSS Base score: 7.8
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/281182 for the current score.
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)

CVEID:CVE-2023-23931
**DESCRIPTION:**PyPI cryptography package could allow a remote attacker to bypass security restrictions, caused by a memory corruption in Cipher.update_into. By passing an immutable python object as the outbuf, an attacker could exploit this vulnerability to bypass authentication and obtain access.
CVSS Base score: 4.8
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/246738 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L)

CVEID:CVE-2024-35195
**DESCRIPTION:**Psf Requests could allow a local authenticated attacker to bypass security restrictions, caused by an incorrect control flow implementation vulnerability. If the first request in a session is made with verify=False, all subsequent requests to the same host will continue to ignore cert verification. An attacker could exploit this vulnerability to launch further attacks on the system.
CVSS Base score: 10
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/291111 for the current score.
CVSS Vector:

CVEID:CVE-2024-39689
**DESCRIPTION:**Certifi python-certifi could provide weaker than expected security, caused by the use of GLOBALTRUST root certificate. An attacker could exploit this vulnerability to launch further attacks on the system.
CVSS Base score: 10
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/297375 for the current score.
CVSS Vector:

Affected Products and Versions

Affected Product(s) Version(s)
App Connect Enterprise Certified Container 5.0-lts
App Connect Enterprise Certified Container 7.1
App Connect Enterprise Certified Container 7.2
App Connect Enterprise Certified Container 8.0
App Connect Enterprise Certified Container 8.1
App Connect Enterprise Certified Container 8.2
App Connect Enterprise Certified Container 9.0
App Connect Enterprise Certified Container 9.1
App Connect Enterprise Certified Container 9.2
App Connect Enterprise Certified Container 10.0
App Connect Enterprise Certified Container 10.1
App Connect Enterprise Certified Container 11.0
App Connect Enterprise Certified Container 11.1
App Connect Enterprise Certified Container 11.2
App Connect Enterprise Certified Container 11.3
App Connect Enterprise Certified Container 11.4
App Connect Enterprise Certified Container 11.5
App Connect Enterprise Certified Container 11.6
App Connect Enterprise Certified Container 12.0
App Connect Enterprise Certified Container 12.1

Remediation/Fixes

IBM strongly suggests the following:
App Connect Enterprise Certified Container up to 12.1.0 (Continuous Delivery)

Upgrade to App Connect Enterprise Certified Container Operator version 12.2.0 or higher, and ensure that all DesignerAuthoring components are at 12.0.12.4-r1 or higher. Documentation on the upgrade process is available at <https://www.ibm.com/docs/en/app-connect/containers_cd?topic=releases-upgrading-operator&gt;

App Connect Enterprise Certified Container 12.0 LTS (Long Term Support)

Upgrade to App Connect Enterprise Certified Container Operator version 12.0.2 or higher, and ensure that all DesignerAuthoring components are at 12.0.12-r2 or higher. Documentation on the upgrade process is available at <https://www.ibm.com/docs/en/app-connect/12.0?topic=umfpr-upgrading-operator-releases&gt;

App Connect Enterprise Certified Container 5.0 LTS (Long Term Support)

Upgrade to App Connect Enterprise Certified Container Operator version 5.0.19 or higher, and ensure that all DesignerAuthoring components are at 12.0.12.3-r1-lts or higher. Documentation on the upgrade process is available at <https://www.ibm.com/docs/en/app-connect-contlts?topic=releases-upgrading-operator&gt;

Workarounds and Mitigations

None

Affected configurations

Vulners
Node
ibmapp_connect_enterpriseMatch5.0
OR
ibmapp_connect_enterpriseMatch7.1
OR
ibmapp_connect_enterpriseMatch7.2
OR
ibmapp_connect_enterpriseMatch8.0
OR
ibmapp_connect_enterpriseMatch8.1
OR
ibmapp_connect_enterpriseMatch8.2
OR
ibmapp_connect_enterpriseMatch9.0
OR
ibmapp_connect_enterpriseMatch9.1
OR
ibmapp_connect_enterpriseMatch9.2
OR
ibmapp_connect_enterpriseMatch10.0
OR
ibmapp_connect_enterpriseMatch10.1
OR
ibmapp_connect_enterpriseMatch11.0
OR
ibmapp_connect_enterpriseMatch11.1
OR
ibmapp_connect_enterpriseMatch11.2
OR
ibmapp_connect_enterpriseMatch11.3
OR
ibmapp_connect_enterpriseMatch11.4
OR
ibmapp_connect_enterpriseMatch11.5
OR
ibmapp_connect_enterpriseMatch11.6
OR
ibmapp_connect_enterpriseMatch12.0
OR
ibmapp_connect_enterpriseMatch12.1

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

8.6

Confidence

High

EPSS

0.001

Percentile

35.7%