Lucene search

K
ibmIBM616B9D338FE05387920626E6D84C2A0408648EB65F12DE09DFF54DA7C324206C
HistorySep 22, 2022 - 10:10 a.m.

Security Bulletin: Operations Dashboard is vulnerable to request smuggling due to Golang Go vulnerability CVE-2022-1705

2022-09-2210:10:07
www.ibm.com
18
operations dashboard
request smuggling
golang go
cve-2022-1705
ibm cloud pak integration

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

0.002 Low

EPSS

Percentile

54.6%

Summary

Operations Dashboard is vulnerable to request smuggling due to Golang Go vulnerability CVE-2022-1705

Vulnerability Details

CVEID:CVE-2022-1705
**DESCRIPTION:**Golang Go is vulnerable to HTTP request smuggling, caused by a flaw with accepting of some invalid Transfer-Encoding headers in the HTTP/1 client in net/http. By sending a specially-crafted HTTP(S) transfer-encoding request header, an attacker could exploit this vulnerability to poison the web cache, bypass web application firewall protection, and conduct XSS attacks.
CVSS Base score: 6.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/233258 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)

Affected Products and Versions

Affected Product(s) Version(s)
Operations Dashboard 2020.4.1
2021.1.1
2021.2.1
2021.3.1
2021.4.1
2022.2.1

Remediation/Fixes

Operations Dashboard version 2020.4.1 in IBM Cloud Pak for Integration
Upgrade Operations Dashboard to 2020.4.1-13-eus using the Operator upgrade process described in the IBM Documentation
<https://www.ibm.com/docs/en/cloud-paks/cp-integration/2020.4?topic=components-upgrading-operations-dashboard&gt;

Operations Dashboard version 2021.1.1, 2021.2.1, 2021.3.1, 2021.4.1, and 2022.2.1 in IBM Cloud Pak for Integration
Upgrade Operations Dashboard to 2022.2.1-2-lts using the Operator upgrade process described in the IBM Documentation
<https://www.ibm.com/docs/en/cloud-paks/cp-integration/2021.4?topic=capabilities-upgrading-integration-tracing&gt;

Workarounds and Mitigations

None

Affected configurations

Vulners
Node
ibmmarketing_operationsMatch2020.4.12021.1.12021.2.12021.3.12021.4.12022.2.1

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

0.002 Low

EPSS

Percentile

54.6%