DataPower GUI is vulnerable to an XML External Entity Injection attack from a low-privileged DataPower account. IBM has addressed the applicable CVE
CVEID: CVE-2018-1421**
DESCRIPTION:** IBM DataPower Gateways is vulnerable to a XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources.
CVSS Base Score: 7.1
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/139023 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L)
DataPower versions 7.1.0.0-7.1.0.21, 7.2.0.0-7.2.0.18, 7.5.0.0-7.5.0.13, 7.5.1.0-7.5.1.12, 7.5.2.0-7.5.2.12, 7.6.0.0-7.6.0.5
Fix is available in versions 7.1.0.22, 7.2.0.19, 7.5.0.14, 7.5.1.13, 7.5.2.13, 7.6.0.6. Refer to APAR IT23854 for URLs to download the fix.
None
Monitor the security notifications on the IBM Cloud Status page to be advised of future security bulletins.
Complete CVSS v2 Guide
On-line Calculator v2
Complete CVSS v3 Guide
On-line Calculator v3
Off
IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog
The vulnerability was reported to IBM by Moshe Mizrahi
March 27 2018: Original version published
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.
[{“Product”:{“code”:“SS9H2Y”,“label”:“IBM DataPower Gateway”},“Business Unit”:{“code”:“BU053”,“label”:“Cloud & Data Platform”},“Component”:“Not Applicable”,“Platform”:[{“code”:“PF009”,“label”:“Firmware”}],“Version”:“7.6;7.5.2;7.5.1;7.5;7.2;7.1”,“Edition”:“Edition Independent”,“Line of Business”:{“code”:“LOB45”,“label”:“Automation”}}]