Lucene search

K
ibmIBMCB7286186B856CE21D311A17E3F6A74B47A16D41DC05C6F9163FF36E72A5CDFD
HistoryApr 09, 2020 - 2:28 p.m.

Security Bulletin: Possible remote code execution vulnerability in Watson Knowledge Catalog for IBM Cloud Pak for Data

2020-04-0914:28:50
www.ibm.com
7

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

4.6 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:S/C:P/I:P/A:P

Summary

There is a possible remote code execution vulnerability in the Watson Knowledge Catalog for IBM Cloud Pak for Data Apache Solr service. This vulnerability has been addressed.

Vulnerability Details

CVEID:CVE-2019-17558
**DESCRIPTION:**Apache Solr could allow a remote attacker to execute arbitrary code on the system. By providing a Velocity template through the VelocityResponseWriter, an attacker could exploit this vulnerability to execute arbitrary code on the system.
CVSS Base score: 9.8
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/173628 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

Affected Products and Versions

Affected Product(s) Version(s)
IBM Watson Knowledge Catalog on-prem 2.0
IBM Cloud Pak for Data 2.5

Remediation/Fixes

Install wkc-patch-3.0.0.4 for IBM Cloud Pak for Data.

Contact IBM support for more details.

Workarounds and Mitigations

The Watson Knowledge Catalog for IBM Cloud Pak for Data Apache Solr service is not exposed outside of the IBM Cloud Pak for Data cluster. The attacker must penetrate the cluster before this can be exploited.

The remote code execution is also limited to the Solr service container.

CPENameOperatorVersion
ibm cloud pak for dataeq2.5

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

4.6 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:S/C:P/I:P/A:P