API Connect has addressed the following vulnerabilities.
CVEID: CVE-2018-7603 DESCRIPTION: The Search Autocomplete for Drupal is vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A remote attacker could exploit this vulnerability using a specially-crafted URL to execute script in a victim’s Web browser within the security context of the hosting Web site, once the URL is clicked. An attacker could use this vulnerability to steal the victim’s cookie-based authentication credentials.
CVSS Base Score: 6.1
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/151407> for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)
Additional issues addressed:
<https://www.drupal.org/sa-core-2018-006>
<https://www.drupal.org/sa-contrib-2018-069>
|
—|—
IBM API Connect
|
5.0.0.0-5.0.8.4
IBM API Connect | 2018.1-2018.3.7
|
|
|
—|—|—|—
IBM API Connect | 5.0.0.0-5.0.8.4 |
LI80396
|
Addressed in IBM API Connect V5.0.8.4 interim fix.
Developer Portal is impacted.
Follow this link and find the “5.0.8.4-iFix-APIConnect-Portal-Ubuntu16-2018_MMDD_-1604.ova” package released on or after 2018/10/22.
IBM API Connect | 2018.1-2018.3.7 |
LI80396
|
Developer Portal is impacted.
A code fix will be provided via the next release and this bulletin will be updated.
Workaround: Drupal administrators to apply the following workaround.
People->Permissions
Search for ‘Use the site-wide contact form’ and remove the checkbox for “Anonymous users” and click Save.