Lucene search

K
ibmIBM38DC3F8E6DA5AE751B580BDDC59111DD9C68031722EFD391A2B6BFEFC01091BE
HistoryMay 12, 2023 - 1:37 p.m.

Security Bulletin: Multiple Vulnerabilities in Multicloud Management Security Services

2023-05-1213:37:14
www.ibm.com
26
ibm cloud pak
multicloud management
security services
cve-2022-31512
cve-2022-31504
cve-2022-31527
cve-2022-32148
vulnerabilities
flask
golang go
remote attack

CVSS2

6.4

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:N/A:P

CVSS3

9.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L

EPSS

0.003

Percentile

67.9%

Summary

Multiple vulnerabilities were fixed in IBM Cloud Pak for Multicloud Management Security Services

Vulnerability Details

CVEID:CVE-2022-31512
**DESCRIPTION:**flask-mvc could allow a remote attacker to traverse directories on the system, caused by the Flask send_file function being used unsafely. An attacker could send a specially-crafted URL request containing “dot dot” sequences (/…/) to view arbitrary files on the system or cause a denial of service.
CVSS Base score: 9.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/231110 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L)

CVEID:CVE-2022-31504
**DESCRIPTION:**BaiduWenkuSpider_flaskWeb could allow a remote attacker to traverse directories on the system, caused by the Flask send_file function being used unsafely. An attacker could send a specially-crafted URL request containing “dot dot” sequences (/…/) to view arbitrary files on the system or cause a denial of service.
CVSS Base score: 9.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/231126 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L)

CVEID:CVE-2022-31527
**DESCRIPTION:**flask-file-server could allow a remote attacker to traverse directories on the system, caused by the Flask send_file function being used unsafely. An attacker could send a specially-crafted URL request containing “dot dot” sequences (/…/) to view arbitrary files on the system or cause a denial of service.
CVSS Base score: 9.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/231055 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L)

CVEID:CVE-2022-32148
**DESCRIPTION:**Golang Go could allow a remote attacker to obtain sensitive information, caused by improper exposure of client IP addresses in net/http. By calling httputil.ReverseProxy.ServeHTTP with a Request.Header map containing a nil value for the X-Forwarded-For header, an attacker could exploit this vulnerability to obtain the client IP address information, and use this information to launch further attacks against the affected system.
CVSS Base score: 7.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/233148 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)

Affected Products and Versions

Affected Product(s) Version(s)
IBM Cloud Pak for Multicloud Management Security Services 2.2
IBM Cloud Pak for Multicloud Management Security Services 2.3

Remediation/Fixes

Upgrade to IBM Cloud Pak for Multicloud Management 2.3 Fix Pack 6 by following the instructions in

<https://www.ibm.com/docs/en/cloud-paks/cp-management/2.3.x?topic=upgrade-upgrading-fix-pack-6&gt;

Workarounds and Mitigations

None

Affected configurations

Vulners
Node
ibmcloud_pak_for_multicloud_managementMatch2.2
OR
ibmcloud_pak_for_multicloud_managementMatch2.3
VendorProductVersionCPE
ibmcloud_pak_for_multicloud_management2.2cpe:2.3:a:ibm:cloud_pak_for_multicloud_management:2.2:*:*:*:*:*:*:*
ibmcloud_pak_for_multicloud_management2.3cpe:2.3:a:ibm:cloud_pak_for_multicloud_management:2.3:*:*:*:*:*:*:*

CVSS2

6.4

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:N/A:P

CVSS3

9.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L

EPSS

0.003

Percentile

67.9%