There are vulnerabilities in WAS Liberty used by IBM Spectrum LSF Suite, Spectrum LSF Suite for HPA and Spectrum LSF Application Center.
CVEID: CVE-2019-4304 DESCRIPTION: IBM WebSphere Application Server - Liberty could allow a remote attacker to bypass security restrictions caused by improper session validation.
CVSS Base Score: 6.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/160950 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L)
CVEID: CVE-2019-4305 DESCRIPTION: IBM WebSphere Application Server Liberty could allow a remote attacker to obtain sensitive information caused by the improper setting of a cookie.
CVSS Base Score: 5.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/160951 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
CVEID: CVE-2019-4441 DESCRIPTION: IBM WebSphere Application Server could allow a remote attacker to obtain sensitive information when a stack trace is returned in the browser.
CVSS Base Score: 5.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/163177 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
Spectrum LSF Suite 10.2, Spectrum LSF Suite for HPA 10.2, Spectrum LSF Application Center 10.2
Product
|
VRMF
|
APAR
|
Remediation/First Fix
—|—|—|—
Spectrum LSF Suite
Spectrum LSF Suite for HPA
Spectrum LSF Application Center
|
10.2
|
None
|
1. Download WebSphere Application Server Liberty v19.0.0.6 from the following location: WAS Liberty. (The following steps are using x86_64 as an example.)
2. Copy the package into the Application Center host.
3. On the Application Center host, stop pmc service.
4. On the Application Center host, extract the zip file and replace old files in following directory
$GUI_TOP/3.0
5. Download WebSphere Application Server Liberty v19.0.0.6 fix PH13983 and PH15518 from following locations: PH13983, PH15518
6. Copy the jar files into the Application Center host, directory $GUI_TOP/3.0
7. Run command ‘mkdir $GUI_TOP/3.0/wlp/lib/fixes’
8. Apply the 2 fixes with following commands
‘java -jar 19006-wlp-archive-ifph13983.jar’
‘java -jar 19006-wlp-archive-ifph15518.jar’
9. On the Application Center host, start pmc service.
N/A