Lucene search

K
ibmIBMA3F0F73C564C34889CFF450428C9639D54138F1F9540F74320AAEC30CDBAF1C6
HistoryJun 08, 2021 - 12:42 a.m.

Security Bulletin: IBM Cloud Pak for Applications 4.3 nodejs and nodejs-express Appsody stacks is vulnerable to information disclosure, buffer overflow and prototype pollution exposures

2021-06-0800:42:15
www.ibm.com
35
ibm cloud pak
node.js
information disclosure
buffer overflow
prototype pollution
cve-2020-15095
cve-2020-8116
cve-2020-8201
cve-2020-8252
vulnerability
security exposure
remediation
software upgrade

EPSS

0.003

Percentile

71.6%

Summary

IBM Cloud Pak for Applications 4.3 nodejs and nodejs-express Appsody stacks is vulnerable to information disclosure, buffer overflow and prototype pollution exposures (CVE-2020-15095, CVE-2020-8116, CVE-2020-8201 and CVE-2020-8252).

Vulnerability Details

CVEID:CVE-2020-15095
**DESCRIPTION:**Node.js npm CLI module could allow a local attacker to obtain sensitive information, caused by the storing of user credentials in the log file. By persuading a victim to open a log file, an attacker could exploit this vulnerability to obtain user credentials.
CVSS Base score: 4.7
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/184666 for the current score.
CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N)

CVEID:CVE-2020-8116
**DESCRIPTION:**Node.js dot-prop could allow a remote attacker to execute arbitrary code on the system, caused by a prototype pollution. By sending a specially crafted request, an attacker could exploit this vulnerability to execute arbitrary code on the system or cause a denial of service.
CVSS Base score: 9.8
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/175850 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

CVEID:CVE-2020-8201
**DESCRIPTION:**Node.js is vulnerable to HTTP request smuggling, caused by CR-to-Hyphen conversion. By sending specially crafted HTTP request headers, an attacker could exploit this vulnerability to poison the web cache, bypass web application firewall protection, and conduct XSS attacks.
CVSS Base score: 7.4
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/188591 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N)

CVEID:CVE-2020-8252
**DESCRIPTION:**Node.js is vulnerable to a buffer overflow, caused by improper bounds checking by the libuv's fs.realpath.native. By sending an overly long argument, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause a denial of service.
CVSS Base score: 7.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/188593 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)

Affected Products and Versions

Affected Product(s) Version(s)
IBM Cloud Pak for Applications 4.3

Remediation/Fixes

To remove the security vulnerability exposure, use the new nodejs and nodejs-express stacks in IBM Cloud Pak for Applications, change the stack hub repository for your kabanero resource. For example, “oc edit kabanero kabanero” and change the url for the repsitory:

apiVersion: kabanero.io/v1alpha2
kind: Kabanero
metadata:
name: kabanero
namespace: kabanero
spec:

repositories:
- gitRelease: {}
https:
url: <https://github.com/icp4apps/stack-hub/releases/download/0.22.1/icp4apps-stack-hub-index.yaml&gt;

This configuration change will pick up the new nodejs and nodejs-express stacks located at: <https://github.com/kabanero-io/collections/releases/tag/0.10.4&gt;

Workarounds and Mitigations

None