Lucene search

K
ibmIBMD41A4CC544201167F63B59F0196510E6D296542EC2948CFD904801E92B267CCC
HistoryMar 05, 2024 - 4:16 p.m.

Security Bulletin: IBM App Connect Enterprise Certified Container operator and operands are vulnerable to loss of confidentiality due to [CVE-2023-39326]

2024-03-0516:16:50
www.ibm.com
17
ibm app connect enterprise
golang go
vulnerability
upgrade
patch
confidentiality
remote attacker
sensitive information
http request
affected products
version
continuous delivery
long term support

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

6.1 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

20.4%

Summary

The operator and some binary components within IBM App Connect Enterprise Certified Container are implemented in Golang. IBM App Connect Enterprise Certified Container operator and operands are vulnerable to loss of confidentiality. This bulletin provides patch information to address the reported vulnerability in Golang Go. [CVE-2023-39326]

Vulnerability Details

CVEID:CVE-2023-39326
**DESCRIPTION:**Golang Go could allow a remote attacker to obtain sensitive information, caused by a flaw in the net/http package. By sending a specially crafted HTTP request, an attacker could exploit this vulnerability to read many more bytes from the network than are in the body, and use this information to launch further attacks against the affected system.
CVSS Base score: 5.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/273322 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)

Affected Products and Versions

Affected Product(s) Version(s)
App Connect Enterprise Certified Container 4.x
App Connect Enterprise Certified Container 5.0-lts
App Connect Enterprise Certified Container 5.1
App Connect Enterprise Certified Container 5.2
App Connect Enterprise Certified Container 6.x
App Connect Enterprise Certified Container 7.x
App Connect Enterprise Certified Container 8.x
App Connect Enterprise Certified Container 9.x
App Connect Enterprise Certified Container 10.x
App Connect Enterprise Certified Container 11.x

Remediation/Fixes

IBM strongly suggests the following:
App Connect Enterprise Certified Container 4.1.0 to 11.1.0 (Continuous Delivery)

Upgrade to App Connect Enterprise Certified Container Operator version 11.2.0 or higher, and ensure that all DesignerAuthoring, IntegrationServer and IntegrationRuntime components are at 12.0.11.1-r1 or higher. Documentation on the upgrade process is available at <https://www.ibm.com/docs/en/app-connect/containers_cd?topic=releases-upgrading-operator&gt;

App Connect Enterprise Certified Container 5.0 LTS (Long Term Support)

Upgrade to App Connect Enterprise Certified Container Operator version 5.0.15 or higher, and ensure that all DesignerAuthoring and IntegrationServer components are at 12.0.11.2-r1-lts or higher. Documentation on the upgrade process is available at <https://www.ibm.com/docs/en/app-connect-contlts?topic=releases-upgrading-operator&gt;

Workarounds and Mitigations

None

Affected configurations

Vulners
Node
ibmapp_connect_enterpriseMatch4.1
OR
ibmapp_connect_enterpriseMatch4.2
OR
ibmapp_connect_enterpriseMatch5.0
OR
ibmapp_connect_enterpriseMatch5.1
OR
ibmapp_connect_enterpriseMatch5.2
OR
ibmapp_connect_enterpriseMatch6.0
OR
ibmapp_connect_enterpriseMatch6.1
OR
ibmapp_connect_enterpriseMatch6.2
OR
ibmapp_connect_enterpriseMatch7.0
OR
ibmapp_connect_enterpriseMatch7.1
OR
ibmapp_connect_enterpriseMatch7.2
OR
ibmapp_connect_enterpriseMatch8.0
OR
ibmapp_connect_enterpriseMatch8.1
OR
ibmapp_connect_enterpriseMatch8.2
OR
ibmapp_connect_enterpriseMatch9.0
OR
ibmapp_connect_enterpriseMatch9.1
OR
ibmapp_connect_enterpriseMatch9.2
OR
ibmapp_connect_enterpriseMatch10.0
OR
ibmapp_connect_enterpriseMatch10.1
OR
ibmapp_connect_enterpriseMatch11.0
OR
ibmapp_connect_enterpriseMatch11.1

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

6.1 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

20.4%