Lucene search

K
ibmIBMD73A9F5F3197EA1885282AB616D5508F171BD694FB10744405E7A2FBB535F92D
HistoryJun 25, 2024 - 3:36 p.m.

Security Bulletin: Sterling B2B Integrator Standard Edition is vulnerable to cross-site scripting ( CVE-2023-42014).

2024-06-2515:36:30
www.ibm.com
5
ibm sterling b2b integrator
cross-site scripting
content-security-policy
javascript
credential disclosure
authentication
server-side validation

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

6.2 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

Summary

In Sterling B2B Integrator Standard Edition Console, the Content-Security-Policy header in the console for B2Bi is not set to the stictest available value. The Content-Security-Policy that is set by the server allows inline Javascript and “eval” functions in the browser. Allowing inline Javascript and inline eval functions can cause cross-site scripting attack by passing engineered Javascript from HTTP request parameters.

Vulnerability Details

CVEID:CVE-2023-42014
**DESCRIPTION:**IBM Sterling B2B Integrator Standard Edition is vulnerable to cross-site scripting. This vulnerability allows an authenticated user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
CVSS Base score: 5.4
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/265511 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N)

Affected Products and Versions

Affected Product(s) Version(s)
IBM Sterling B2B Integrator 6.2.x
IBM Sterling B2B Integrator 6.1.x

Remediation/Fixes

The chance of the exploitation of the vulnerability is minimal because it requires being authenticated with a valid session. Furthermore, B2Bi does extensive server-side validation of the request parameters to ensure that any Javascript would be safely ignored.

Workarounds and Mitigations

None

Affected configurations

Vulners
Node
ibmsterling_b2b_integratorMatch6.0.0.0
OR
ibmsterling_b2b_integratorMatch6.2.0.2

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

6.2 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

Related for D73A9F5F3197EA1885282AB616D5508F171BD694FB10744405E7A2FBB535F92D