Lucene search

K
ibmIBMEF17A94A609DA705D034CD9B6B16C9EDC3CE02BB9C921E1FDD57E5680C723A48
HistorySep 08, 2022 - 12:26 a.m.

Security Bulletin: Potential Security Vulnerabilities fixed in IBM WebSphere Application Server 7.0.0.35

2022-09-0800:26:26
www.ibm.com
31

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.956 High

EPSS

Percentile

99.4%

Summary

Cross reference list for security vulnerabilites fixed in IBM WebSphere Application Server 7.0.0.35, IBM WebSphere Application Server Hypervisor 7.0.0.35 and IBM HTTP Server 7.0.0.35.

Vulnerability Details

CVE ID:CVE-2014-3021(APAR PI08268) **

DESCRIPTION: ** IBM WebSphere Application Server could allow a remote attacker to obtain sensitive information caused by a vulnerability in HTTP headers used by Web Applications. An attacker could exploit this vulnerability using a specially crafted HTTP method to access cookie and authentication data, which could be used to launch further attacks on the system.**

CVSS:** _
CVSS Base Score: 5.0
CVSS Temporal Score: See _https://exchange.xforce.ibmcloud.com/vulnerabilities/93059 for the current score
CVSS Environmental Score*: Undefined
CVSS String: (AV:N/AC:L/Au:N/C:P/I:N/A:N)
**

AFFECTED VERSIONS**: The following IBM WebSphere Application Server Versions are affected:

  • Version 8.5 Full Profile and Liberty Profile
  • Version 8
  • Version 7

**
Remediation/Fixes: **The recommended solution is to apply the Fix Pack or PTF for each named product as soon as practical. _
Fix:_

Apply an Interim Fix, Fix Pack or PTF containing this APAR PI08268, as noted below: **

For IBM WebSphere Application Server

For V8.5.0.0 through 8.5.5.3:**

  • Apply Fix Pack 4 (8.5.5.4), or later.

**
For V8.0.0.0 through 8.0.0.9:**

  • Apply Fix Pack 10 (8.0.0.10), or later.

**
For V7.0.0.0 through 7.0.0.33:**

  • Apply Fix Pack 35 (7.0.0.35), or later.

_
Workaround(s):None known
Mitigation(s):_
None known

CVE ID:CVE-2014-3083(APAR PI17768) **

DESCRIPTION: WebSphere Application Server could allow a remote attacker to obtain sensitive information, caused by the failure to restrict access to resources located within the web application. An attacker could exploit this vulnerability to obtain configuration data and other sensitive information.

CVSS:** _
CVSS Base Score: 5.0
CVSS Temporal Score: See _https://exchange.xforce.ibmcloud.com/vulnerabilities/93954 for the current score
CVSS Environmental Score*: Undefined
CVSS String: (AV:N/AC:L/Au:N/C:P/I:N/A:N)
**

AFFECTED VERSIONS**: The following IBM WebSphere Application Server Versions are affected:

  • Version 8.5
  • Version 8.5 Liberty Profile if you have installed the Portlet Container feature from the WASdev Liberty Repository.
  • Version 8
  • Version 7

**
Remediation/Fixes: Remediation is needed for WebSphere Application Server as well as there may be a need for your own portlets to be updated to avoid this issue. The recommended solution is to apply the Fix Pack or PTF for each named product as soon as practical_
Fix:_**
Apply an Interim Fix, Fix Pack or PTF containing this APAR PI17768, as noted below: **

For IBM WebSphere Application Server

For V8.5.0.0 through 8.5.5.2 (Full Profile):**

  • Apply Fix Pack 3 (8.5.5.3), or later.

-- Or โ€“

For V8.5.0.0. through 8.5.5.2 (Liberty Profile):**
If you have the installed the Portlet Container Feature from WASdev Liberty Repository:**

  • Remove the Portlet Container feature from your Liberty Profile server by deleting the following files and directories:

usr\extension\dev\api\spec\com.ibm.websphere.appserver.api.portlet_2.0.0.jar usr\extension\dev\api\spec\com.ibm.ws.javaee.ccpp_1.0.0.jar usr\extension\dev\api\spec\com.ibm.ws.javaee.portlet_2.0.0.jar usr\extension\lib\com.ibm.ws.portletcontainer_2.0.0.jar usr\extension\lib\features\com.ibm.websphere.appserver.portlet-2.0.mf usr\extension\lib\features\l10n\com.ibm.websphere.appserver.portlet-2.0.properties usr\extension\lafiles\com.ibm.websphere.appserver.portlet-2.0 directory and all subdirectories

Then install the most current version of the Portlet Container from the WASdev Liberty Repository.
**
For V8.0.0.0 through 8.0.0.9:**

  • Apply Fix Pack 10 (8.0.0.10), or later.

-- Or โ€“

**
For V7.0.0.0 through 7.0.0.33:**

  • Apply Fix Pack 35 (7.0.0.35), or later.

-- Or โ€“

**
Remediation for portlets: **

All JSR 286 compliant portlets that derive from class javax.portlet.GenericPortlet must override method serveResource.
An overriding serveResource implementation must not call super.serveResource.
If the portlet does not use resource serving, a empty implementation of serveResource should be used.

Example: This empty implementation is correct for a portlet that does not use resource serving: @Override ** public** **void** serveResource(ResourceRequest request, ResourceResponse response) **throws** PortletException, IOException { // Empty implementation on purpose if (logger.isLoggable(Level.WARNING) { // Unexpected call to serveResource, therefore log a warning. logger.log(Level.WARNING, "Unexpected call to serveResource."); } } `

Example of a WRONG fix:

@Override **
public** void serveResource(ResourceRequest request, ResourceResponse response) throws PortletException, IOException {
// **FIXME**This is wrong: Calling super.serveResource does not fix the security issue ! **
super** .serveResource(request, response);
}` **_

Workaround(s):None known
Mitigation(s):_** None known

CVE IDs:CVE-2014-0226CVE-2014-0231CVE-2014-0118****CVE-2013-5704** (APAR PI22070)

Affected Versions/Remediation/Fixes/Workaround/Mitigation**
Please refer to IBM HTTP Server Security bulletin for multiple vulnerabilities for remediation information.

**** **CVE IDs: **CVE-2014-4770**and CVE-2014-4816 (APAR PI23055) **
**DESCRIPTION:**IBM WebSphere Application Server Admin Console is vulnerable to cross-site scripting and cross-site request forgery.

Affected Versions/Remediation/Fixes/Workaround/Mitigation
Please refer to _WebSphere Application Server Security bulletin for CVE-2014-4770 and CVE-2014-4816 _ for remediation information.

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.956 High

EPSS

Percentile

99.4%