API Connect has addressed the following vulnerability.
IBM LoopBack could allow an attacker to bypass authentication if the AccessToken Model is exposed over a REST API, because it is then possible for anyone to create an AccessToken for any User, provided they know the userID and can hence get access to the other users data / access to their privileges (if the user happens to be an Admin for example).
CVEID:CVE-2018-1778
**DESCRIPTION:*IBM LoopBack could allow an attacker to bypass authentication if the AccessToken Model is exposed over a REST API, it is then possible for anyone to create an AccessToken for any User provided they know the userID and can hence get access to the other users data / access to their privileges (if the user happens to be an Admin for example).
CVSS Base Score: 7.7
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/148801> for the current score
CVSS Environmental Score: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L)
IBM API Connect | 2018.1-2018.4.1 |
---|---|
IBM API Connect | 5.0.8.0-5.0.8.4 |
IBM API Connect V2018.1 - 2018.4.1 | 2018.4.1.1 | LI80357 |
Addressed in IBM API Connect V2018.4.1.1 release.
Follow this link and find the appropriate packages for your deployment.
http://www.ibm.com/support/fixcentral/swg/quickorder?parent=ibm%7EWebSphere&product=ibm/WebSphere/IBM+API+Connect&release=2018.3.7&platform=All&function=all&source=fc
—|—|—|—
IBM API Connect V5.0.0.0 - 5.0.8.4 | 5.0.8.5 | LI80357 |
Addressed in IBM API Connect V5.0.8.5 fix pack.
Follow this link and find the appropriate packages for your deployment.
http://www.ibm.com/support/fixcentral/swg/quickorder?parent=ibm%7EWebSphere&product=ibm/WebSphere/IBM+API+Connect&release=5.0.8.4&platform=All&function=all&source=fc