IBM API Connect has addressed the following vulnerability.
Drupal could allow a remote attacker to execute arbitrary code on the system, caused by an error within multiple subsystems. An attacker could exploit this vulnerability using multiple attack vectors to execute arbitrary code on the system.
CVEID:CVE-2018-7602**
DESCRIPTION: *Drupal could allow a remote attacker to execute arbitrary code on the system, caused by an error within multiple subsystems. An attacker could exploit this vulnerability using multiple attack vectors to execute arbitrary code on the system.
CVSS Base Score: 9.8
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/142366 for the current score
CVSS Environmental Score: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
Affected IBM API Connect
|
Affected Versions
โ|โ
IBM API Management| 4.0.0.0-4.0.4.6
IBM API Connect| 5.0.0.0-5.0.6.6
IBM API Connect| 5.0.7.0-5.0.7.2
IBM API Connect| 5.0.8.0-5.0.8.2
IBM API Connect| 2018.1.0-2018.2.3
Affected Product
|
Addressed in VRMF
|
APAR
|
Remediation / First Fix
โ|โ|โ|โ
IBM API Management
4.0.0.0-4.0.4.6| 4.0.4.6 iFix| LI80096 | Addressed in IBM API Connect Developer Portal V4.0.4.6 iFix
Follow this link and find the โAPIManagement-AdvancedPortalโ
iFix dated on or after 2018/04/25.
5.0.0.0-5.0.6.6| 5.0.6.6 iFix| LI80096 | Addressed in IBM API Connect Developer Portal V5.0.6.6 iFix
Follow this link and find the โAPIConnect-Portalโ
iFix dated on or after 2018/04/25.
5.0.7.0-5.0.7.2| 5.0.7.2 iFix
| LI80096 | Addressed in IBM API Connect Developer Portal V5.0.7.2 iFix
Follow this link and find the
โAPIConnect-Portalโ
iFix dated on or after 2018/04/25.
5.0.8.0-5.0.8.2| 5.0.8.3| LI80096 | Addressed in IBM API Connect Developer Portal V5.0.8.3
Follow this link and find the โAPIConnect-Portalโ
iFix dated on or after 2018/04/25.
2018.1.0-2018.2.3| 2018.2.4| LI80096 | Addressed in IBM API Connect Developer Portal 2018.2.4
Follow this link and find the appropriate form factor for your installation: โapiconnect-portalโ or apicup* or ICP for
2018.2.4.