Lucene search

K
ibmIBM4726D58587EE8412D67A331D82BD496807214AF416DF9A71BAB9B7D943A8F674
HistoryDec 14, 2020 - 2:45 p.m.

Security Bulletin: Gradle version in IBP javaenv and dind images depends on vulnerable Apache Ant

2020-12-1414:45:31
www.ibm.com
32

0.002 Low

EPSS

Percentile

52.0%

Summary

Versions of IBP images javaenv and dind before 2.5.1 release on 12082020 included a version of gradle that depended upon vulnerable Apache libraries. Gradle is a build system, intended to aid in building chaincode, though not required for building chaincode.

Vulnerability Details

CVEID:CVE-2020-11979
**DESCRIPTION:**Apache Ant could allow a remote authenticated attacker to bypass security restrictions, caused by an insecure temporary file flaw. By sending a specially-crafted request, an attacker could exploit this vulnerability to inject modified source files into the build process.
CVSS Base score: 6.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/189164 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N)

Affected Products and Versions

Affected Product(s) Version(s)
IBM Blockchain Platform (Software/on-prem) All

Remediation/Fixes

Update javaenv and dind images. The gradle instance on the images has been replaced by a gradle ‘wrapper’ that will install the latest version of gradle.

Workarounds and Mitigations

Update Gradle, or use another build system, e.g. Maven.