Lucene search

K
ibmIBMEF47864ADD8AB84E8802620F7F570E0D715EF28E56AC0EB8B74BB0F691C0B78F
HistoryFeb 11, 2020 - 6:29 p.m.

Security Bulletin: Jetty vulnerabilities found in IBM Sterling B2B Integrator and IBM Sterling File Gateway (CVE-2011-4461, CVS-2009-4612, CVE-2009-4611, CVE-2009-4610, CVS-2009-4609, CVE-2009-1524, CVE-2009-1523)

2020-02-1118:29:33
www.ibm.com
14

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

Summary

IBM Sterling B2B Integrator and IBM Sterling File Gateway use Jetty version 6.1.8. and thus are affected by the following security vulnerabilities discovered in the Jetty version 6.1.8

Vulnerability Details

CVEID:CVE-2011-4461

DESCRIPTION: Mort Bay Jetty 6.1.8 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters.

CVSS Base Score: 5
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/72017&gt; for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P)

CVEID:CVE-2009-4612

DESCRIPTION: Multiple cross-site scripting (XSS) vulnerabilities in the WebApp JSP Snoop page in Mort Bay Jetty 6.1.8 allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO to the default URI under (1) jspsnoop/, (2) jspsnoop/ERROR/, and (3) jspsnoop/IOException/, and possibly the PATH_INFO to (4) snoop.jsp.

CVSS Base Score: 4.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/55652 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N)

CVEID:CVE-2009-4611

DESCRIPTION: Mort Bay Jetty 6.1.8 writes backtrace data without sanitizing non-printable characters, which might allow remote attackers to modify a window’s title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator, related to (1) a string value in the Age parameter to the default URI for the Cookie Dump Servlet in test-jetty-webapp/src/main/java/com/acme/CookieDump.java under cookie/, (2) an alphabetic value in the A parameter to jsp/expr.jsp, or (3) an alphabetic value in the Content-Length HTTP header to an arbitrary application.

CVSS Base Score: 5.1
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/55533&gt; for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:H/Au:N/C:P/I:P/A:P)

CVEID:CVE-2009-4610

DESCRIPTION: Multiple cross-site scripting (XSS) vulnerabilities in Mort Bay Jetty 6.1.8 allows remote attackers to inject arbitrary web script or HTML via (1) the query string to jsp/dump.jsp in the JSP Dump feature, or the (2) Name or (3) Value parameter to the default URI for the Session Dump Servlet under session/.

CVSS Base Score: 4.3
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/55651&gt; for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N)

CVEID:CVE-2009-4609

DESCRIPTION:The Dump Servlet in Mort Bay Jetty 6.1.8 allows remote attackers to obtain sensitive information about internal variables and other data via a request to a URI ending in /dump/, as demonstrated by discovering the value of the getPathTranslated variable.

CVSS Base Score: 5.0
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/55650&gt; for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:N/C:P/N:P/A:N)

CVEID:CVE-2009-1524

DESCRIPTION: Cross-site scripting (XSS) vulnerability in Mort Bay Jetty in 6.1.8 allows remote attackers to inject arbitrary web script or HTML via a directory listing request containing a ; (semicolon) character.

CVSS Base Score: 4.3
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/50301&gt; for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:N/N:P/A:N)

CVEID:CVE-2009-1523

DESCRIPTION: Directory traversal vulnerability in the HTTP server in Mort Bay Jetty 6.1.8 allows remote attackers to access arbitrary files via directory traversal sequences in the URI.

CVSS Base Score: 4.3
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/50298&gt; for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:P/N:N/A:N)

Affected Products and Versions

IBM Sterling B2B Integrator 5.1 or IBM Sterling File Gateway 2.1
IBM Sterling B2B Integrator 5.2 or IBM Sterling File Gateway 2.2

Remediation/Fixes

Product

| VRMF| APAR| Remediation/First Fix
β€”|β€”|β€”|β€”
_IBM Sterling B2B Integrator _| 5.1.x|

IC9918

| Jetty has been upgraded to version 6.1.26. Apply Generic Interim Fix 5104_3. Available on IWM
IBM Sterling File Gateway| 2.1.x| Jetty has been upgraded to version 6.1.26. Apply Generic Interim Fix 5104_3. Available on IWM
IBM Sterling B2B Integrator| 5.2.4.2| Jetty has been upgraded to version 6.1.26. Apply Generic Interim Fix 5020402_2. Available on Fix Central
IBM Sterling File Gateway

_ _

| 2.2.4.2| Jetty has been upgraded to version 6.1.26. Apply Generic Interim Fix 5020402_2. Available on Fix Central
IBM Sterling B2B Integrator| 5.2.x| Jetty has been upgraded to version 6.1.26. Apply 5020500 Fix Pack or Media available on Fix Central and Passport Advantage respectively
IBM Sterling File Gateway

_ _

| 2.2.x| Jetty has been upgraded to version 6.1.26. Apply 5020500 Fix Pack or Media available on Fix Central and Passport Advantage respectively

To acquire the fix please login to IWM
See FAQs on downloading an iFix from the IWM site_
_
To acquire the fix please login to IBM Fix Central.
More details and release notes can be found here:
IBM Sterling B2B Integrator 5.2 Information Center

To acquire the fix from Passport Advantage, please login here.

Workarounds and Mitigations

None Known.

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P