Lucene search

K
ibmIBM4C93D8E527886B465217E2F1061D427E78E036E6C0DB7ED6E89399439F8563D8
HistoryJan 08, 2024 - 3:57 p.m.

Security Bulletin: IBM App Connect Enterprise Toolkit and IBM Integration Bus Toolkit are vulnerable to a remote attacker due to Eclipse JGit (CVE-2023-4759)

2024-01-0815:57:39
www.ibm.com
10
ibm
app connect enterprise
integration bus
remote code execution
eclipse jgit
cve-2023-4759
vulnerability
windows
symlink
mitigation
git configuration

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

9.7 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

48.0%

Summary

Windows users of the Eclipse eGit feature in IBM App Connect Enterprise Toolkit and IBM Integration Bus Toolkit are vulnerable to a remote attacker.

Vulnerability Details

CVEID:CVE-2023-4759
**DESCRIPTION:**Eclipse JGit could allow a remote attacker to execute arbitrary code on the system, caused by improper handling of case insensitive filesystems. By using a specially crafted symlink, an attacker could exploit this vulnerability to execute arbitrary code on the system.
CVSS Base score: 8.8
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/265872 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)

Affected Products and Versions

Affected Product(s) Version(s)
IBM App Connect Enterprise 12.0.1.0 - 12.0.11.0
IBM App Connect Enterprise 11.0.0.1 - 11.0.0.24
IBM Integration Bus 10.1 - 10.1.0.2

Remediation/Fixes

See **Workarounds and Mitigations **

Workarounds and Mitigations

This affects windows users of the Eclipse eGit feature in the IBM App Connect Enterprise Toolkit and IBM Integration Bus Toolkit only

As described in the National Vulnerability Database entry <https://nvd.nist.gov/vuln/detail/CVE-2023-4759&gt; the user performing the clone or checkout must have authority to create symbolic links and symbolic links must be enabled in the git configuration for the issue to occur.

This issue can be mitigated by setting the following git configuration option to disable symbolic links before checking out

  • core.symlinks = false

Affected configurations

Vulners
Node
ibmapp_connect_enterpriseRange12.0.1.0
OR
ibmapp_connect_enterpriseRange12.0.11.0
OR
ibmapp_connect_enterpriseRange11.0.0.1
OR
ibmapp_connect_enterpriseRange11.0.0.24
OR
ibmintegration_busRange10.1
OR
ibmintegration_busRange10.1.0.2

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

9.7 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

48.0%

Related for 4C93D8E527886B465217E2F1061D427E78E036E6C0DB7ED6E89399439F8563D8