A potential security vulnerability exists in IBM Rational Performance Tester related to OpenSAML. OpenSAML could allow a remote authenticated attacker to obtain sensitive information, caused by an error when parsing XML entities. By persuading a victim to open a specially-crafted XML document containing external entity references, an attacker could exploit this vulnerability to obtain sensitive information. The vulnerability has been eliminated in the latest version of IBM Rational Performance Tester.
| Subscribe to My Notifications to be notified of important product support alerts like this.
CVE ID: CVE-2013-6440
Description: OpenSAML could allow a remote authenticated attacker to obtain sensitive information, caused by an error when parsing XML entities.
CVSS Base Score: 4.3 **CVSS Temporal Score:**See <https://exchange.xforce.ibmcloud.com/vulnerabilities/89714> for the current score *CVSS Environmental Score:**Undefined CVSS Vector: (AV:N/AC:M/Au:S/C:N/I:P/A:N)
Rational Performance Tester versions 8.2.x, 8.3.x, 8.5.x.
Upgrade to Rational Performance Tester Fix Pack 2 (8.5.1.2) for 8.5.1
The workaround for version 8.5.x:
com.ibm.rational.ttt.common.models.core
.For example:
C:\IBM\IBMIMShared\plugins\com.ibm.rational.ttt.common.models.core_8.3.0.v20120926_1424\lib\open\security
Delete the two jars
Download the jar opensaml-2.6.1.jar (_<http://shibboleth.net/downloads/java-opensaml/>_)
Rename to **opensaml-2.5.1-1.jar
**
5. Place if into the installation directory in which the two previous jars were located.
The workaround for versions 8.2 / 8.2.1 / 8.3.x
com.ibm.rational.ttt.common.models.core
.For example:
C:\IBM\IBMIMShared\plugins\com.ibm.rational.ttt.common.models.core_8.3.0.v20120926_1424\lib\open\security
Delete the two jars.
Download the jar opensaml-2.6.1.jar (_<http://shibboleth.net/downloads/java-opensaml/>_)
Rename to opensaml-2.2.3.jar
Place if into the installation directory in which the two previous jars were located.