Lucene search

K
ibmIBMF426BDEEA0109CBE44C73C53461CE7144BDD04ADCF7EC044CE76723EAE672095
HistoryApr 22, 2022 - 11:43 a.m.

Security Bulletin: Vulnerability exists for Spring Framework in Watson Explorer (CVE-2021-22060, CVE-2022-22965, CVE-2022-22950)

2022-04-2211:43:07
www.ibm.com
14

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.975 High

EPSS

Percentile

100.0%

Summary

Security vulnerability in Spring Framework affects IBM Watson Explorer. IBM Watson Explorer has addressed this vulnerability.

Vulnerability Details

CVEID:CVE-2021-22060
**DESCRIPTION:**VMware Tanzu Spring Framework could allow a remote authenticated attacker to bypass security restrictions, caused by improper input validation. By sending a specially-crafted request, an attacker could exploit this vulnerability to insert additional log entries.
CVSS Base score: 4.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/217183 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N)

CVEID:CVE-2022-22965
**DESCRIPTION:**Spring Framework could allow a remote attacker to execute arbitrary code on the system, caused by the improper handling of PropertyDescriptor objects used with data binding. By sending specially-crafted data to a Spring Java application, an attacker could exploit this vulnerability to execute arbitrary code on the system. Note: The exploit requires Spring Framework to be run on Tomcat as a WAR deployment with JDK 9 or higher using spring-webmvc or spring-webflux. Note: This vulnerability is also known as Spring4Shell or SpringShell.
CVSS Base score: 9.8
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/223103 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

CVEID:CVE-2022-22950
**DESCRIPTION:**VMware Tanzu Spring Framework is vulnerable to a denial of service, caused by improper input validation. By sending a specially-crafted crafted SpEL expression, a remote attacker could exploit this vulnerability to cause a denial of service condition.
CVSS Base score: 5.4
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/223096 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L)

Affected Products and Versions

Affected Product(s) Version(s)
IBM Watson Explorer Deep Analytics Edition Foundational Components

12.0.0.0,

12.0.1,

12.0.2.0 - 12.0.2.2,

12.0.3.0 - 12.0.3.9

IBM Watson Explorer Deep Analytics Edition Analytical Components|

12.0.0.0,

12.0.1,

12.0.2.0 - 12.0.2.2,

12.0.3.0 - 12.0.3.9

IBM Watson Explorer Foundational Components| 11.0.0.0 - 11.0.0.3,
11.0.1,
11.0.2.0 - 11.0.2.13
IBM Watson Explorer Analytical Components| 11.0.0.0 - 11.0.0.3,
11.0.1,
11.0.2.0 - 11.0.2.13

Remediation/Fixes

Affected Product Affected Versions How to acquire and apply the fix
IBM Watson Explorer Deep Analytics Edition
Foundational Components

12.0.0.0,

12.0.1,

12.0.2.0 - 12.0.2.2, 12.0.3.0 - 12.0.3.9

|

Query Modifier service is affected by this vulnerability. If Query Modifier service is installed (see Installing Query Modifier), please follow the steps below.

  1. If you have not already installed, install V12.0.3.9 (see the Fix Pack download document).
  2. Download the interim fix from Fix Central: 12.0.3.9-WS-WatsonExplorer-DAEFoundational-IF001.
  3. To apply the fix, follow the steps below.
1. Stop Query Modifier service if it is running  

  * Linux: Run /etc/init.d/querymodifier stop
  * Windows: Open the Service window, choose the Query Modifier Service, and click the Stop Service button.
2. Navigate to <install_dir>/Engine/nlq
3. Rename querymodifier.jar to querymodifier.jar.bak
4. Copy the downloaded querymodifier.jar to <install_dir>/Engine/nlq
5. Run install command  

  * Linux: querymodifier-install.sh
  * Windows: querymodifier-install.ps1
6. Start Query Modifier service if you use the service  

  * Linux: Run /etc/init.d/querymodifier start
  * Windows: Open the Service window, choose the Query Modifier Service, and click the Start Service button.  

IBM Watson Explorer Deep Analytics Edition Analytical Components| 12.0.0.0, 12.0.1, 12.0.2.0 - 12.0.2.2, 12.0.3.0 - 12.0.3.9|

Natural Language Query service is affected by this vulnerability. Please follow the steps below.

  1. If you have not already installed, install V12.0.3.9 (see the Fix Pack download document).
  2. Download the interim fix from Fix Central: 12.0.3.9-WS-WatsonExplorer-DAEAnalytical-IF001.
  3. To apply the fix, follow the steps below.
1. Stop all services if it is running  

esadmin stop
2. Navigate to <install_dir>/lib
3. Rename querymodifier.jar and es.indexservice.jar to querymodifier.jar.bak and es.indexservice.jar.bak
4. Copy the downloaded querymodifier.jar and es.indexservice.jar to <install_dir>/lib
5. Start all services
esadmin start
IBM Watson Explorer
Foundational Components| 11.0.0.0 - 11.0.0.3,
11.0.1,
11.0.2.0 -
11.0.2.13|

Query Modifier service is affected by this vulnerability. If Query Modifier service is installed (see Installing Query Modifier), please follow the steps below.

  1. If you have not already installed, install V11.0.2.13 (see the Fix Pack download document).
  2. Download the interim fix for your edition (Enterprise or Advanced) from Fix Central: 11.0.2.13-WS-WatsonExplorer-<Edition>Foundational-IF001(EE for Enterprise Edition, AE for Advanced Edition).
  3. To apply the fix, follow the steps below.
1. Stop Query Modifier service if it is running  

  * Linux: Run /etc/init.d/querymodifier stop
  * Windows: Open the Service window, choose the Query Modifier Service, and click the Stop Service button.
2. Navigate to &lt;install_dir&gt;/Engine/nlq
3. Rename querymodifier.jar to querymodifier.jar.bak
4. Copy the downloaded querymodifier.jar to &lt;install_dir&gt;/Engine/nlq
5. Run install command  

  * Linux: querymodifier-install.sh
  * Windows: querymodifier-install.ps1
6. Start Query Modifier service if you use the service  

  * Linux: Run /etc/init.d/querymodifier start
  * Windows: Open the Service window, choose the Query Modifier Service, and click the Start Service button.  

IBM Watson Explorer Analytical Components| 11.0.0.0 - 11.0.0.3,
11.0.1,
11.0.2.0 -
11.0.2.13|

Natural Language Query service is affected by this vulnerability. Please follow the steps below.

  1. If you have not already installed, install V11.0.2.13 (see the Fix Pack download document).
  2. Download the interim fix from Fix Central: 11.0.2.13-WS-WatsonExplorer-AEAnalytical-IF001.
  3. To apply the fix, follow the steps below.
1. Stop all services if it is running  

esadmin stop
2. Navigate to <install_dir>/lib
3. Rename querymodifier.jar and es.indexservice.jar to querymodifier.jar.bak and es.indexservice.jar.bak
4. Copy the downloaded querymodifier.jar and es.indexservice.jar to <install_dir>/lib
5. Start all services
esadmin start

Workarounds and Mitigations

None

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.975 High

EPSS

Percentile

100.0%