Lucene search

K
ibmIBM6A665BFE089E6915405804A36BDD124C8C3A870E3C583D6B77300AC4A3A92AE5
HistoryNov 28, 2022 - 4:28 p.m.

Security Bulletin: IBM Sterling Connect:Direct for UNIX is vulnerable to remote code execution due to Apache Commons Text [CVE-2022-42889]

2022-11-2816:28:57
www.ibm.com
20

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.972 High

EPSS

Percentile

99.8%

Summary

IBM Sterling Connect:Direct for UNIX components Install Agent and File Agent are vulnerable to remote code execution due to Apache Commons Text [CVE-2022-42889]. Apache Commons Text has been upgraded to version 1.10.0 in IBM Sterling Connect:Direct for UNIX Install Agent and File Agent.

Vulnerability Details

CVEID:CVE-2022-42889
**DESCRIPTION:**Apache Commons Text could allow a remote attacker to execute arbitrary code on the system, caused by an insecure interpolation defaults flaw. By sending a specially-crafted input, an attacker could exploit this vulnerability to execute arbitrary code on the system.
CVSS Base score: 9.8
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/238560 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

Affected Products and Versions

Affected Product(s) Version(s)
IBM Sterling Connect:Direct for UNIX 6.2.0.0 - 6.2.0.5.iFix003
IBM Sterling Connect:Direct for UNIX 6.1.0.0 - 6.1.0.4.iFix068
IBM Sterling Connect:Direct for UNIX 6.0.0.0 - 6.0.0.2.iFix138
IBM Sterling Connect:Direct for UNIX 4.3.0.0 - 4.3.0.1.iFix102

Remediation/Fixes

IBM strongly recommends addressing the vulnerability now by upgrading

Product Version Remediation/Fix/Instructions
IBM Sterling Connect:Direct for UNIX 6.2.0 Apply 6.2.0.5.iFix004, available on Fix Central.
IBM Sterling Connect:Direct for UNIX 6.1.0 Apply 6.1.0.4.iFix069, available on Fix Central.
IBM Sterling Connect:Direct for UNIX 6.0.0 Apply 6.0.0.2.iFix139, available on Fix Central.
IBM Sterling Connect:Direct for UNIX 4.3.0 Apply 4.3.0.1.iFix103, available on Fix Central.

Workarounds and Mitigations

None

Affected configurations

Vulners
Node
ibmsterling_connect\Matchdirect6.2.0
OR
ibmsterling_connect\Matchdirect6.1.0
OR
ibmsterling_connect\Matchdirect6.0.0
OR
ibmsterling_connect\Matchdirect4.3.0

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.972 High

EPSS

Percentile

99.8%