9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.975 High
EPSS
Percentile
100.0%
Security vulnerability in Spring Framework affects IBM Watson Explorer. IBM Watson Explorer has addressed this vulnerability.
CVEID:CVE-2021-22060
**DESCRIPTION:**VMware Tanzu Spring Framework could allow a remote authenticated attacker to bypass security restrictions, caused by improper input validation. By sending a specially-crafted request, an attacker could exploit this vulnerability to insert additional log entries.
CVSS Base score: 4.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/217183 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N)
CVEID:CVE-2022-22965
**DESCRIPTION:**Spring Framework could allow a remote attacker to execute arbitrary code on the system, caused by the improper handling of PropertyDescriptor objects used with data binding. By sending specially-crafted data to a Spring Java application, an attacker could exploit this vulnerability to execute arbitrary code on the system. Note: The exploit requires Spring Framework to be run on Tomcat as a WAR deployment with JDK 9 or higher using spring-webmvc or spring-webflux. Note: This vulnerability is also known as Spring4Shell or SpringShell.
CVSS Base score: 9.8
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/223103 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
CVEID:CVE-2022-22950
**DESCRIPTION:**VMware Tanzu Spring Framework is vulnerable to a denial of service, caused by improper input validation. By sending a specially-crafted crafted SpEL expression, a remote attacker could exploit this vulnerability to cause a denial of service condition.
CVSS Base score: 5.4
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/223096 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L)
Affected Product(s) | Version(s) |
---|---|
IBM Watson Explorer Deep Analytics Edition Foundational Components |
12.0.0.0,
12.0.1,
12.0.2.0 - 12.0.2.2,
12.0.3.0 - 12.0.3.9
IBM Watson Explorer Deep Analytics Edition Analytical Components|
12.0.0.0,
12.0.1,
12.0.2.0 - 12.0.2.2,
12.0.3.0 - 12.0.3.9
IBM Watson Explorer Foundational Components| 11.0.0.0 - 11.0.0.3,
11.0.1,
11.0.2.0 - 11.0.2.13
IBM Watson Explorer Analytical Components| 11.0.0.0 - 11.0.0.3,
11.0.1,
11.0.2.0 - 11.0.2.13
Affected Product | Affected Versions | How to acquire and apply the fix |
---|---|---|
IBM Watson Explorer Deep Analytics Edition | ||
Foundational Components |
12.0.0.0,
12.0.1,
12.0.2.0 - 12.0.2.2, 12.0.3.0 - 12.0.3.9
|
Query Modifier service is affected by this vulnerability. If Query Modifier service is installed (see Installing Query Modifier), please follow the steps below.
1. Stop Query Modifier service if it is running
* Linux: Run /etc/init.d/querymodifier stop
* Windows: Open the Service window, choose the Query Modifier Service, and click the Stop Service button.
2. Navigate to <install_dir>/Engine/nlq
3. Rename querymodifier.jar to querymodifier.jar.bak
4. Copy the downloaded querymodifier.jar to <install_dir>/Engine/nlq
5. Run install command
* Linux: querymodifier-install.sh
* Windows: querymodifier-install.ps1
6. Start Query Modifier service if you use the service
* Linux: Run /etc/init.d/querymodifier start
* Windows: Open the Service window, choose the Query Modifier Service, and click the Start Service button.
IBM Watson Explorer Deep Analytics Edition Analytical Components| 12.0.0.0, 12.0.1, 12.0.2.0 - 12.0.2.2, 12.0.3.0 - 12.0.3.9|
Natural Language Query service is affected by this vulnerability. Please follow the steps below.
1. Stop all services if it is running
esadmin stop
2. Navigate to <install_dir>/lib
3. Rename querymodifier.jar and es.indexservice.jar to querymodifier.jar.bak and es.indexservice.jar.bak
4. Copy the downloaded querymodifier.jar and es.indexservice.jar to <install_dir>/lib
5. Start all services
esadmin start
IBM Watson Explorer
Foundational Components| 11.0.0.0 - 11.0.0.3,
11.0.1,
11.0.2.0 -
11.0.2.13|
Query Modifier service is affected by this vulnerability. If Query Modifier service is installed (see Installing Query Modifier), please follow the steps below.
1. Stop Query Modifier service if it is running
* Linux: Run /etc/init.d/querymodifier stop
* Windows: Open the Service window, choose the Query Modifier Service, and click the Stop Service button.
2. Navigate to <install_dir>/Engine/nlq
3. Rename querymodifier.jar to querymodifier.jar.bak
4. Copy the downloaded querymodifier.jar to <install_dir>/Engine/nlq
5. Run install command
* Linux: querymodifier-install.sh
* Windows: querymodifier-install.ps1
6. Start Query Modifier service if you use the service
* Linux: Run /etc/init.d/querymodifier start
* Windows: Open the Service window, choose the Query Modifier Service, and click the Start Service button.
IBM Watson Explorer Analytical Components| 11.0.0.0 - 11.0.0.3,
11.0.1,
11.0.2.0 -
11.0.2.13|
Natural Language Query service is affected by this vulnerability. Please follow the steps below.
1. Stop all services if it is running
esadmin stop
2. Navigate to <install_dir>/lib
3. Rename querymodifier.jar and es.indexservice.jar to querymodifier.jar.bak and es.indexservice.jar.bak
4. Copy the downloaded querymodifier.jar and es.indexservice.jar to <install_dir>/lib
5. Start all services
esadmin start
None
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.975 High
EPSS
Percentile
100.0%