IBM Cloud Functions has addressed the following vulnerabilities. Users of the IBM Cloud Functions service that are using docker actions (https://console.bluemix.net/docs/openwhisk/openwhisk_actions.html#creating-docker-actions) are affected but only if the userβs function has a general security vulnerability. In this context general vulnerability means for example parameter hijacking, remote code execution or wrong usage of βeval()β (generally addressed via secure engineering best practices). With this vulnerability being present, an attacker can exploit an Apache OpenWhisk specific vulnerability to overwrite the user functions code that is then executed in subsequent executions of the same userβs function. The CVE listed below only refer to the ability to overwrite the action code. The general vulnerability which is a pre-condition for these CVEs is out of scope of this document as it is subject to general secure engineering best practices. Exploitation of the issue is only possible if the user included function code is vulnerable. The vulnerability only affects users with action code that is vulnerable in the first place. Other users who followed general secure engineering best practices are not affected.
CVEID:CVE-2018-11756
**DESCRIPTION:*Apache OpenWhisk could allow a remote attacker to execute arbitrary code on the system, caused by an error in PHP Runtime. An attacker could exploit this vulnerability using a specially crafted parameter to overwrite the source code of a function being executed inside the container and execute arbitrary code on the system.
CVSS Base Score: 7.3
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/147372> for the current score
CVSS Environmental Score: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
CVEID:CVE-2018-11757
**DESCRIPTION:*Apache OpenWhisk could allow a remote attacker to execute arbitrary code on the system, caused by an error in PHP Runtime. An attacker could exploit this vulnerability using a specially crafted parameter to overwrite the source code of a function being executed inside the container and execute arbitrary code on the system.
CVSS Base Score: 7.3
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/147371> for the current score
CVSS Environmental Score: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
IBM Cloud Functions service by using custom docker images.
Users that create their custom Docker runtimes to run as IBM Cloud Functions Docker actions, and who pin their Docker runtime image (e.g.,Dockerfile starts with βFROM openwhisk/dockerskeleton:1.0.0β) shouldupgrade their Docker tag to the latest available tag and rebuild their actions following the documentation: https://console.bluemix.net/docs/openwhisk/openwhisk_actions.html#creatβ¦. Users who create docker images not based on the IBM Cloud Functions provided docker SDK should use the latest commit Git tag https://github.com/apache/incubator-openwhisk-runtime-docker/commit/891β¦. All other supported runtimes like php, java, nodejs, swift, python etc do not require action to be taken by the user as the fix has been deployed to all IBM Cloud Functions regions and is applied automatically.
Exploitation of the vulnerability is only possible if the userβs function code is vulnerable.
To prevent exploitation of the issue all security engineering best practices should also be followed when creating actions in IBM Cloud Functions. This includesparameter sanitisation, scanning action code and dependencies for vulnerabilities, keeping dependencies up-to-date, scanning APIβs for vulnerabilities, etc.
CPE | Name | Operator | Version |
---|---|---|---|
ibm cloud functions | eq | any |