logo
DATABASE RESOURCES PRICING ABOUT US

Security Bulletin: Vulnerability exists for Spring Framework in Watson Explorer (CVE-2021-22060, CVE-2022-22965, CVE-2022-22950)

Description

## Summary Security vulnerability in Spring Framework affects IBM Watson Explorer. IBM Watson Explorer has addressed this vulnerability. ## Vulnerability Details ** CVEID: **[CVE-2021-22060](<https://vulners.com/cve/CVE-2021-22060>) ** DESCRIPTION: **VMware Tanzu Spring Framework could allow a remote authenticated attacker to bypass security restrictions, caused by improper input validation. By sending a specially-crafted request, an attacker could exploit this vulnerability to insert additional log entries. CVSS Base score: 4.3 CVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/217183](<https://exchange.xforce.ibmcloud.com/vulnerabilities/217183>) for the current score. CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N) ** CVEID: **[CVE-2022-22965](<https://vulners.com/cve/CVE-2022-22965>) ** DESCRIPTION: **Spring Framework could allow a remote attacker to execute arbitrary code on the system, caused by the improper handling of PropertyDescriptor objects used with data binding. By sending specially-crafted data to a Spring Java application, an attacker could exploit this vulnerability to execute arbitrary code on the system. Note: The exploit requires Spring Framework to be run on Tomcat as a WAR deployment with JDK 9 or higher using spring-webmvc or spring-webflux. Note: This vulnerability is also known as Spring4Shell or SpringShell. CVSS Base score: 9.8 CVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/223103](<https://exchange.xforce.ibmcloud.com/vulnerabilities/223103>) for the current score. CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) ** CVEID: **[CVE-2022-22950](<https://vulners.com/cve/CVE-2022-22950>) ** DESCRIPTION: **VMware Tanzu Spring Framework is vulnerable to a denial of service, caused by improper input validation. By sending a specially-crafted crafted SpEL expression, a remote attacker could exploit this vulnerability to cause a denial of service condition. CVSS Base score: 5.4 CVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/223096](<https://exchange.xforce.ibmcloud.com/vulnerabilities/223096>) for the current score. CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L) ## Affected Products and Versions Affected Product(s)| Version(s) ---|--- IBM Watson Explorer Deep Analytics Edition Foundational Components| 12.0.0.0, 12.0.1, 12.0.2.0 - 12.0.2.2, 12.0.3.0 - 12.0.3.9 IBM Watson Explorer Deep Analytics Edition Analytical Components| 12.0.0.0, 12.0.1, 12.0.2.0 - 12.0.2.2, 12.0.3.0 - 12.0.3.9 IBM Watson Explorer Foundational Components| 11.0.0.0 - 11.0.0.3, 11.0.1, 11.0.2.0 - 11.0.2.13 IBM Watson Explorer Analytical Components| 11.0.0.0 - 11.0.0.3, 11.0.1, 11.0.2.0 - 11.0.2.13 ## Remediation/Fixes **Affected Product**| **Affected Versions**| **How to acquire and apply the fix** ---|---|--- IBM Watson Explorer Deep Analytics Edition Foundational Components| 12.0.0.0, 12.0.1, 12.0.2.0 - 12.0.2.2, 12.0.3.0 - 12.0.3.9 | Query Modifier service is affected by this vulnerability. If Query Modifier service is installed (see [Installing Query Modifier](<https://www.ibm.com/docs/en/watson-explorer/12.0.x?topic=explorer-installing-query-modifier>)), please follow the steps below. 1. If you have not already installed, install V12.0.3.9 (see the Fix Pack [download document](<https://www.ibm.com/support/pages/node/6539806>)). 2. Download the interim fix from [Fix Central](<https://www-945.ibm.com/support/fixcentral/swg/selectFixes?parent=Watson%2BGroup&product=ibm/Information+Management/InfoSphere+Data+Explorer&release=12.0.3.9&platform=All&function=all>): **12.0.3.9-WS-WatsonExplorer-DAEFoundational-IF001**. 3. To apply the fix, follow the steps below. 1. Stop Query Modifier service if it is running * Linux: Run /etc/init.d/querymodifier stop * Windows: Open the Service window, choose the Query Modifier Service, and click the Stop Service button. 2. Navigate to <install_dir>/Engine/nlq 3. Rename querymodifier.jar to querymodifier.jar.bak 4. Copy the downloaded querymodifier.jar to <install_dir>/Engine/nlq 5. Run install command * Linux: querymodifier-install.sh * Windows: querymodifier-install.ps1 6. Start Query Modifier service if you use the service * Linux: Run /etc/init.d/querymodifier start * Windows: Open the Service window, choose the Query Modifier Service, and click the Start Service button. IBM Watson Explorer Deep Analytics Edition Analytical Components| 12.0.0.0, 12.0.1, 12.0.2.0 - 12.0.2.2, 12.0.3.0 - 12.0.3.9| Natural Language Query service is affected by this vulnerability. Please follow the steps below. 1. If you have not already installed, install V12.0.3.9 (see the Fix Pack [download document](<https://www.ibm.com/support/pages/node/6539808>)). 2. Download the interim fix from [Fix Central](<https://www-945.ibm.com/support/fixcentral/swg/selectFixes?parent=Watson%2BGroup&product=ibm/Information+Management/InfoSphere+Data+Explorer&release=12.0.3.9&platform=All&function=all>): **12.0.3.9-WS-WatsonExplorer-DAEAnalytical-IF001**. 3. To apply the fix, follow the steps below. 1. Stop all services if it is running esadmin stop 2. Navigate to <install_dir>/lib 3. Rename querymodifier.jar and es.indexservice.jar to querymodifier.jar.bak and es.indexservice.jar.bak 4. Copy the downloaded querymodifier.jar and es.indexservice.jar to <install_dir>/lib 5. Start all services esadmin start IBM Watson Explorer Foundational Components| 11.0.0.0 - 11.0.0.3, 11.0.1, 11.0.2.0 - 11.0.2.13| Query Modifier service is affected by this vulnerability. If Query Modifier service is installed (see [Installing Query Modifier](<https://www.ibm.com/docs/en/watson-explorer/11.0.2?topic=explorer-installing-query-modifier>)), please follow the steps below. 1. If you have not already installed, install V11.0.2.13 (see the Fix Pack [download document](<https://www.ibm.com/support/pages/node/6539814>)). 2. Download the interim fix for your edition (Enterprise or Advanced) from [Fix Central](<https://www-945.ibm.com/support/fixcentral/swg/selectFixes?parent=Watson%2BGroup&product=ibm/Information+Management/InfoSphere+Data+Explorer&release=11.0.2.11&platform=All&function=all>): **11.0.2.13-WS-WatsonExplorer-<Edition>Foundational-IF001 **(EE for Enterprise Edition, AE for Advanced Edition). 3. To apply the fix, follow the steps below. 1. Stop Query Modifier service if it is running * Linux: Run /etc/init.d/querymodifier stop * Windows: Open the Service window, choose the Query Modifier Service, and click the Stop Service button. 2. Navigate to <install_dir>/Engine/nlq 3. Rename querymodifier.jar to querymodifier.jar.bak 4. Copy the downloaded querymodifier.jar to <install_dir>/Engine/nlq 5. Run install command * Linux: querymodifier-install.sh * Windows: querymodifier-install.ps1 6. Start Query Modifier service if you use the service * Linux: Run /etc/init.d/querymodifier start * Windows: Open the Service window, choose the Query Modifier Service, and click the Start Service button. IBM Watson Explorer Analytical Components| 11.0.0.0 - 11.0.0.3, 11.0.1, 11.0.2.0 - 11.0.2.13| Natural Language Query service is affected by this vulnerability. Please follow the steps below. 1. If you have not already installed, install V11.0.2.13 (see the Fix Pack [download document](<http://www.ibm.com/support/pages/node/6497905>)). 2. Download the interim fix from [Fix Central](<https://www-945.ibm.com/support/fixcentral/swg/selectFixes?parent=Watson%2BGroup&product=ibm/Information+Management/InfoSphere+Data+Explorer&release=11.0.2.13&platform=All&function=all>): **11.0.2.13-WS-WatsonExplorer-AEAnalytical-IF001**. 3. To apply the fix, follow the steps below. 1. Stop all services if it is running esadmin stop 2. Navigate to <install_dir>/lib 3. Rename querymodifier.jar and es.indexservice.jar to querymodifier.jar.bak and es.indexservice.jar.bak 4. Copy the downloaded querymodifier.jar and es.indexservice.jar to <install_dir>/lib 5. Start all services esadmin start ## Workarounds and Mitigations None ##


Affected Software


CPE Name Name Version
watson explorer 11.0.0
watson explorer 11.0.1
watson explorer 11.0.2
watson explorer 12.0.0
watson explorer 12.0.1
watson explorer 12.0.2
watson explorer 12.0.3

Related