Lucene search

K
ibmIBM4C9F4A997478DE4630D7E83FDA2A63BF481CB5A6CD4A04D67F75556EFA86E244
HistoryApr 29, 2021 - 11:17 a.m.

Security Bulletin: IBM App Connect Enterprise Certified Container flows may be vulnerable to spoofing attacks (CVE-2020-26291)

2021-04-2911:17:57
www.ibm.com
7
ibm app connect enterprise
spoofing attack
vulnerability
node.js
url
input validation
cvss score
affected products
remediation
upgrade

EPSS

0.001

Percentile

30.8%

Summary

An App Connect Enterprise flow that uses the Jira connector may be vulnerable to a spoofing attack if the flow can be made to target a specially-crafted URL

Vulnerability Details

CVEID:CVE-2020-26291
**DESCRIPTION:**Node.js urijs module could allow a remote attacker to conduct spoofing attacks, caused by improper input validation. By persuading a victim to visit a specially-crafted URL, an attacker could exploit this vulnerability using a backslash (\) character followed by an at (@) character to spoof the Hostname.
CVSS Base score: 6.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/194370 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N)

Affected Products and Versions

Affected Product(s) Version(s)
App Connect Enterprise Certified Container 1.0 with Operator
App Connect Enterprise Certified Container 1.1 with Operator

Remediation/Fixes

App Connect Enterprise Certified Container 1.0 CD

Upgrade to App Connect Enterprise Certified Container to Operator version 1.2.0 (available in CASE 1.2.0) or higher, and ensure that all components are at 11.0.0.11-r1 or higher.

App Connect Enterprise Certified Container 1.1 LTS

Upgrade to App Connect Enterprise Certified Container Operator version 1.1.1 EUS (available in CASE 1.1.1) or higher, and ensure that all components are at 11.0.0.12-r1-eus or higher.

Workarounds and Mitigations

None

EPSS

0.001

Percentile

30.8%

Related for 4C9F4A997478DE4630D7E83FDA2A63BF481CB5A6CD4A04D67F75556EFA86E244