Lucene search

K
ibmIBMEB641991DE825481AC6F76AA1698D9687D265C328B6AD66B3DD9CED1ECBD64C6
HistoryJun 17, 2018 - 10:32 p.m.

Security Bulletin: Vulnerability in Apache Commons affects IBM Cloud Orchestrator, IBM Cloud Orchestrator Enterprise, and products shipped with IBM Cloud Orchestrator and IBM Cloud Orchestrator Enterprise (CVE-2015-7450)

2018-06-1722:32:51
www.ibm.com
4

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

Summary

An Apache Commons Collections vulnerability for handling Java object deserialization was addressed by IBM Cloud Orchestrator, IBM Cloud Orchestrator Enterprise, and products shipped with IBM Cloud Orchestrator and IBM Cloud Orchestrator Enterprise.

Vulnerability Details

IBM Business Process Manager and IBM Tivoli System Automation Application Manager are shipped with both IBM Cloud Orchestrator and IBM Cloud Orchestrator Enterprise. IBM SmartCloud Cost Management and IBM Tivoli Monitoring supporting products are shipped with IBM Cloud Orchestrator Enterprise.

CVEID: CVE-2015-7450 DESCRIPTION: Apache Commons Collections could allow a remote attacker to execute arbitrary code on the system, caused by the deserialization of data with Java InvokerTransformer class. By sending specially crafted data, an attacker could exploit this vulnerability to execute arbitrary Java code on the system.
CVSS Base Score: 9.8
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/107918 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

Affected Products and Versions

Affected Principal Product and Versions

| Affected Supporting Product and Version
—|—
IBM Cloud Orchestrator V2 5, V2.5.0.1| IBM Business Process Manager Standard V8.5.6
IBM Tivoli System Automation Application Manager V4.1
IBM Cloud Orchestrator Enterprise V2 5, V2.5.0.1| IBM Business Process Manager Standard V8.5.6
IBM Tivoli System Automation Application Manager V4.1
IBM SmartCloud Cost Management V2.1.0.4
IBM Tivoli Monitoring 6.3.0.2
IBM Cloud Orchestrator V2.4, V2.4.0.1, V2.4.0.2 and V2.4.0.2 Interim Fix1| IBM Business Process Manager Standard V8.5.0.1
IBM Tivoli System Automation Application Manager V4.1
IBM Cloud Orchestrator Enterprise V2.4, V2.4.0.1, V2.4.0.2 and V2.4.0.2 Interim Fix1| IBM Business Process Manager Standard V8.5.0.1
IBM Tivoli System Automation Application ManagerV 4.1
IBM SmartCloud Cost Management V2.1.0.4
IBM Tivoli Monitoring V6.3.0.2

Remediation/Fixes

The recommended solution is to apply the fixes as soon as practical. Please see below for information on the fixes available.

If you are running IBM Cloud Orchestrator V2.5.0.1 upgrade to IBM Cloud Orchestrator V2.5.0.1 Interim Fix 1 for V2.5.0.1 or later.

If you are running IBM Cloud Orchestrator V2.4, V2.4.0.1 or V2.4.0.2, V2.4.0.2 Interim Fix1****upgrade to**IBM Cloud Orchestrator V2.4 Fix Pack 3 (2.4.0.3) **or later.

For affected supporting products shipped with IBM Cloud Orchestrator consult the security bulletins below for vulnerability details and apply fixes as appropriate depending on your environment.

Affected Supporting Product Version Remediation/First Fix
IBM Business Process Manager
8.5.0.1, 8.5.6

| Security Bulletin: Multiple vulnerabilities in IBM Business Process Manager shipped with IBM Cloud Orchestrator and IBM SmartCloud Orchestrator (CVE-2015-7450)
IBM Tivoli System Automation Application Manager| 4.1| Security Bulletin: Multiple vulnerabilities in IBM Tivoli System Automation Application Manager shipped with IBM Cloud Orchestrator and IBM SmartCloud Orchestrator (CVE-2015-7450)

If you are running IBM Cloud Orchestrator Enterprise V2.5.0.1 upgrade to IBM Cloud Orchestrator Enterprise V2.5.0.1 Interim Fix 1 for V2.5.0.1 or later.

If you are running IBM Cloud Orchestrator Enterprise V2.4, V2.4.0.1 or V2.4.0.2, V2.4.0.2 Interim Fix1** **upgrade to IBM Cloud Orchestrator Enterprise V2.4 Fix Pack 3 (2.4.0.3) or later.

For affected supporting products shipped with IBM Cloud Orchestrator Enterprise, consult the security bulletins below for vulnerability details and apply fixes as appropriate depending on your environment.

Affected Supporting Product Version Remediation/First Fix
IBM Business Process Manager 8.5.0.1, 8.5.6 Security Bulletin: Multiple vulnerabilities in IBM Business Process Manager shipped with IBM Cloud Orchestrator and IBM SmartCloud Orchestrator (CVE-2015-7450)
IBM Tivoli System Automation Application Manager 4.1 Security Bulletin: Multiple vulnerabilities in IBM Tivoli System Automation Application Manager shipped with IBM Cloud Orchestrator and IBM SmartCloud Orchestrator (CVE-2015-7450)
IBM SmartCloud Cost Management 2.1.0.4 Security Bulletin: A security vulnerability in IBM SmartCloud Cost Management shipped with IBM Cloud Orchestrator Enterprise and IBM SmartCloud Orchestrator Enterprise (CVE-2015-7450)
IBM Tivoli Monitoring 6.3.0.2 Security Bulletin: Multiple vulnerabilities in IBM Tivoli Monitoring shipped with IBM Cloud Orchestrator Enterprise and IBM SmartCloud Orchestrator Enterprise (CVE-2015-7450)

IBM recommends that you review your entire environment to identify vulnerable releases of the open-source Apache Commons Collections and take appropriate mitigation and remediation actions.

Workarounds and Mitigations

None

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C