Lucene search

K
ibmIBMCBF11400C3B9317362132B88E294153902C7D2970B530137F31783C104663079
HistoryDec 05, 2022 - 6:04 a.m.

Security Bulletin: Rational Test Automation Server is vulnerable to malicious code execution due to Keycloak (CVE-2021-20222)

2022-12-0506:04:55
www.ibm.com
16

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H

5.1 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:P/I:P/A:P

0.002 Low

EPSS

Percentile

53.1%

Summary

Keycloak vulnerability that allows malicious code to be executed impacts Rational Test Automation Server.

Vulnerability Details

CVEID:CVE-2021-20222
**DESCRIPTION:**Keycloak is vulnerable to cross-site scripting, caused by improper validation of user-supplied input by the referrer URL in the new account console. A remote attacker could exploit this vulnerability using a specially-crafted URL to execute script in a victim’s Web browser within the security context of the hosting Web site, once the URL is clicked. An attacker could use this vulnerability to steal the victim’s cookie-based authentication credentials.
CVSS Base score: 8.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/198959 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H)

Affected Products and Versions

Affected Product(s) Version(s)
Rational Test Automation Server All

Remediation/Fixes

Upgrading to Rational Test Automation Server v10.5 is strongly recommended.

Customers with Rational Test Automation Server upgrade to version 10.5 from the entitlement registry.

Instructions for pulling upgraded images:

Workarounds and Mitigations

None

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H

5.1 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:P/I:P/A:P

0.002 Low

EPSS

Percentile

53.1%

Related for CBF11400C3B9317362132B88E294153902C7D2970B530137F31783C104663079