CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
EPSS
Percentile
50.1%
Cross Site Scripting and injection vulnerabilities have been discovered within IBM Security QRadar SIEM.
VULNERABILITY DETAILS:
CVE ID:CVE-2013-5448
DESCRIPTION: A Cross Site Scripting vulnerability has been discovered within the IBM QRadar Security Information and Event Management (SIEM) software in the āRight Click Pluginā context menus for IP information. This issue is only apparent when the plugin menu is enabled (via ip_context_menu.xml file), and is not enabled by default.
The attack requires network access, some specialized knowledge of the system and the attacker does not need to be authenticated by the application. An exploit could impact the integrity of the data, but the availability of the system and confidentiality of information are not compromised.
CVSS:
CVSS Base Score: 4.3
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/87912> for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N)
AFFECT PRODUCTS:
IBM QRadar Security Information and Event Manager (SIEM) 7.1
IBM QRadar Security Information and Event Manager (SIEM) 7.2
REMEDIATION:
The vulnerability is fixed in the following versions of QRadar SIEM:
Ā· For QRadar SIEM 7.2 ā Install QRadar SIEM 7.2 MR1 Patch 1
Ā· For QRadar SIEM 7.1 ā Follow Workaround instructions below (patch to be released on February 3, 2014)
Workaround(s):
The following workaround will work for all versions of the product by disabling the IP Right Click Context Plugin by following the following steps.
1. Using SSH, log in to the IBM QRadar SIEM Console as the root user:
ssh <consoleip>
2. Move the plugin xml file to a backup file.
mv /opt/qradar/conf/ip_context_menu.xml /opt/qradar/conf/ip_context_menu.xml.bak
3. Restart tomcat
service tomcat restart
After these steps have been completed, the plugin menu will be disabled and the system no longer vulnerable to the XSS issue. Once the patch has been applied you can re-enable the plugin menu.
Mitigation(s):
None
ACKNOWLEDGEMENT
This vulnerability was reported to IBM by Stephen Hosom
CVE ID:CVE-2013-6307
DESCRIPTION: A Cross Site Scripting vulnerability has been discovered within the IBM QRadar SIEM software.
The attack requires network access, some specialized knowledge of the system and the attacker does not need to be authenticated by the application. An exploit could impact the integrity of the system, but the availability of the system and confidentiality of information are not compromised.
CVSS:
CVSS Base Score: 4.3
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/88556> for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N)
AFFECT PRODUCTS:
IBM QRadar Security Information and Event Manager (SIEM) 7.0
REMEDIATION:
The vulnerability is fixed in the following versions of QRadar SIEM:
Ā· QRadar SIEM 7.1 MR2 Patch 3 (or higher)
(NOTE: For QRadar SIEM 7.0 users, contact IBM Support for instructions)
Workaround(s):
None
Mitigation(s):
None
ACKNOWLEDGEMENT
This vulnerability was reported to IBM by azzeddine @ zertox1
CVE ID:CVE-2013-5463
DESCRIPTION: It is possible to bypass protections in the QRadar WinCollect agent, by using a injection based attack. Using such an attack it is possible to inject a malicious dll or configuration into the agent, which can affect the security of the host it is installed on.
The attack requires network access, requires some specialized knowledge or techniques and does not require authentication. An exploit can impact the integrity of the system, availability of the system and confidentiality of information stored within the system.
CVSS:
CVSS Base Score: 9.3
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/88361> for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:C/I:C/A:C)
AFFECT PRODUCTS:
IBM QRadar Security Information and Event Manager (SIEM) WinCollect Agent prior to v7.1.1
REMEDIATION:
The vulnerability is fixed in the following versions of QRadar SIEM:
Ā· QRadar SIEM WinCollect Agent 7.1.1 (7.1.1.569824-setup.exe or above)
Workaround(s):
None
Mitigation(s):
None
ACKNOWLEDGEMENT
This vulnerability was reported to IBM by Allan A. Klein
REFERENCES:
Ā· Complete CVSS Guide
Ā· On-line Calculator V2
Ā· CVE-2013-5448
Ā· CVE-2013-6307
Ā· CVE-2013-5463
Ā· https://exchange.xforce.ibmcloud.com/vulnerabilities/87912
Ā· https://exchange.xforce.ibmcloud.com/vulnerabilities/88556
Ā· https://exchange.xforce.ibmcloud.com/vulnerabilities/88361
Ā· IBM Security Alerts
Ā· QRadar SIEM 7.2 MR1 Patch 1
Ā· QRadar SIEM 7.1 MR2 Patch 3
Ā· QRadar SIEM WinCollect Agent 7.1.1
RELATED INFORMATION:
IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog
CHANGE HISTORY:
_*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Flash. _
_Note: _According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an āindustry open standard designed to convey vulnerability severity and help to determine urgency and priority of response.ā IBM PROVIDES THE CVSS SCORES āAS ISā WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY
[{āProductā:{ācodeā:āSSBQACā,ālabelā:āIBM Security QRadar SIEMā},āBusiness Unitā:{ācodeā:āBU059ā,ālabelā:āIBM Software w/o TPSā},āComponentā:āGeneral Informationā,āPlatformā:[{ācodeā:āPF016ā,ālabelā:āLinuxā},{ācodeā:āPF033ā,ālabelā:āWindowsā}],āVersionā:ā7.1;7.0;7.2ā,āEditionā:āā,āLine of Businessā:{ācodeā:āLOB24ā,ālabelā:āSecurity Softwareā}}]
Vendor | Product | Version | CPE |
---|---|---|---|
ibm | qradar_network_security | 7.1 | cpe:2.3:a:ibm:qradar_network_security:7.1:*:*:*:*:*:*:* |
ibm | qradar_network_security | 7.0 | cpe:2.3:a:ibm:qradar_network_security:7.0:*:*:*:*:*:*:* |
ibm | qradar_network_security | 7.2 | cpe:2.3:a:ibm:qradar_network_security:7.2:*:*:*:*:*:*:* |