Lucene search

K
ibmIBM64A5BDA417EBB13DC40CADE8E96083F22857A67D63A774AE52DE053ED9D23BF1
HistoryJun 28, 2024 - 3:29 p.m.

Security Bulletin: Vulnerability in Jinja affects IBM Process Mining CVE-2024-34064

2024-06-2815:29:58
www.ibm.com
2
jinja
vulnerability
cookie-based authentication
ibm process mining
cross-site scripting
security fix
redhat openshift
installation
upgrade

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N

6.7 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

10.4%

Summary

There is a vulnerability in Jinja that could allow an attacker could use this vulnerability to steal the victim’s cookie-based authentication credentials. The code is used by IBM Process Mining. This bulletin identifies the security fixes to apply to address the vulnerability.

Vulnerability Details

CVEID:CVE-2024-34064
**DESCRIPTION:**Jinja is vulnerable to cross-site scripting, caused by the acceptance of keys containing non-attribute characters by the xmlattr filter. A remote attacker could exploit this vulnerability to inject other attributes into a Web page which would be executed in a victims Web browser within the security context of the hosting Web site, once the page is viewed. An attacker could use this vulnerability to steal the victim’s cookie-based authentication credentials.
CVSS Base score: 5.4
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/290008 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N)

Affected Products and Versions

Affected Product(s) Version(s)
IBM Process Mining

1.14.4 IF001, 1.14.4, 1.14.3 IF001, 1.14.3, 1.14.2 IF001, 1.14.2, 1.14.1, 1.14.0

Remediation/Fixes

Any open source library may be included in one or more sub-components of IBM Process Mining. Open source updates are not always synchronized across all components. The CVE in this bulletin are specifically addressed by

Product(s) **Version(s) number and/or range ** Remediation/Fix/Instructions
IBM Process Mining on RedHat OpenShift

1.14.4 IF001, 1.14.4, 1.14.3 IF001, 1.14.3, 1.14.2 IF001, 1.14.2, 1.14.1, 1.14.0

| **Install/Upgrade to version 1.15.0

Installing a Production deployment
1.**To deploy a Production deployment, see installing on
RedHat OpenShift Container Platform environments

**Upgrading an Installation **** **1.To perform an upgrade of a Production deployment, see
upgrading in RedHat OpenShift Container Platform
environments
IBM Process Mining traditional|

1.14.4, 1.14.3, 1.14.2, 1.14.1, 1.14.0

| **Install/Upgrade to version 1.15.0

** 1.Login to PassPortAdvantage
2.Search for
M0JHZML Process Mining 1.15.0 Server Multiplatform
Multilingual
3.Download package
4.Follow install instructions
5.Repeat for M0JJ0ML Process Mining 1.15.0 Client
Windows Multilingual
| | ** **

Workarounds and Mitigations

None known

Affected configurations

Vulners
Node
ibmrobotic_process_automation_as_a_serviceMatch1.14.4
OR
ibmrobotic_process_automation_as_a_serviceMatch001
OR
ibmrobotic_process_automation_as_a_serviceMatch1.14.4
OR
ibmrobotic_process_automation_as_a_serviceMatch1.14.3
OR
ibmrobotic_process_automation_as_a_serviceMatch001
OR
ibmrobotic_process_automation_as_a_serviceMatch1.14.3
OR
ibmrobotic_process_automation_as_a_serviceMatch1.14.2
OR
ibmrobotic_process_automation_as_a_serviceMatch001
OR
ibmrobotic_process_automation_as_a_serviceMatch1.14.2
OR
ibmrobotic_process_automation_as_a_serviceMatch1.14.1
OR
ibmrobotic_process_automation_as_a_serviceMatch1.14.0

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N

6.7 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

10.4%