Lucene search

K
ibmIBMD73A9F5F3197EA1885282AB616D5508F171BD694FB10744405E7A2FBB535F92D
HistoryJun 25, 2024 - 3:36 p.m.

Security Bulletin: Sterling B2B Integrator Standard Edition is vulnerable to cross-site scripting ( CVE-2023-42014).

2024-06-2515:36:30
www.ibm.com
14
ibm sterling b2b integrator
cross-site scripting
content-security-policy
javascript
credential disclosure
authentication
server-side validation

CVSS3

5.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

AI Score

6.2

Confidence

High

EPSS

0

Percentile

13.2%

Summary

In Sterling B2B Integrator Standard Edition Console, the Content-Security-Policy header in the console for B2Bi is not set to the stictest available value. The Content-Security-Policy that is set by the server allows inline Javascript and “eval” functions in the browser. Allowing inline Javascript and inline eval functions can cause cross-site scripting attack by passing engineered Javascript from HTTP request parameters.

Vulnerability Details

CVEID:CVE-2023-42014
**DESCRIPTION:**IBM Sterling B2B Integrator Standard Edition is vulnerable to cross-site scripting. This vulnerability allows an authenticated user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
CVSS Base score: 5.4
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/265511 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N)

Affected Products and Versions

Affected Product(s) Version(s)
IBM Sterling B2B Integrator 6.2.x
IBM Sterling B2B Integrator 6.1.x

Remediation/Fixes

The chance of the exploitation of the vulnerability is minimal because it requires being authenticated with a valid session. Furthermore, B2Bi does extensive server-side validation of the request parameters to ensure that any Javascript would be safely ignored.

Workarounds and Mitigations

None

Affected configurations

Vulners
Node
ibmsterling_b2b_integratorMatch6.0.0.0
OR
ibmsterling_b2b_integratorMatch6.2.0.2
VendorProductVersionCPE
ibmsterling_b2b_integrator6.0.0.0cpe:2.3:a:ibm:sterling_b2b_integrator:6.0.0.0:*:*:*:*:*:*:*
ibmsterling_b2b_integrator6.2.0.2cpe:2.3:a:ibm:sterling_b2b_integrator:6.2.0.2:*:*:*:*:*:*:*

CVSS3

5.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

AI Score

6.2

Confidence

High

EPSS

0

Percentile

13.2%

Related for D73A9F5F3197EA1885282AB616D5508F171BD694FB10744405E7A2FBB535F92D