Lucene search

K
ibmIBME29176A4C511EDCA01697E7E4D3BC6044E6DCAA2FFEB14F21BBE839363DEFC8B
HistoryMay 19, 2019 - 2:45 p.m.

Security Bulletin: API Connect V2018 is impacted by a directory traversal vulnerability in Kubernetes (CVE-2019-1002101)

2019-05-1914:45:01
www.ibm.com
6

0.001 Low

EPSS

Percentile

31.3%

Summary

IBM API Connect has addressed the following vulnerability.

Vulnerability Details

CVEID:CVE-2019-1002101
**DESCRIPTION:*Kubernetes could allow a remote attacker to traverse directories on the system, caused by the improper handling of symlinks. By persuading a victim to use the kubectl cp command or the oc cp command with a malicious container, an attacker could replace or delete arbitrary files on the host machine.
CVSS Base Score: 6.5
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/158804&gt; for the current score
CVSS Environmental Score
: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N)

Affected Products and Versions

Affected IBM API Management Affected Versions
IBM API Connect 2018.1-2018.4.1.4

Remediation/Fixes

Affected releases Fixed in VRMF APAR Remediation / First Fix
IBM API Connect V2018.1-2018.4.1.4 2018.4.1.5 fixpack

LI80824

|

Addressed in IBM API Connect v2018.4.1.5 fixpack.

All components are impacted.

Follow this link and find the appropriate .ova images for 2018.4.1.5.

http://www.ibm.com/support/fixcentral/swg/quickorder?parent=ibm%7EWebSphere&product=ibm/WebSphere/IBM+API+Connect&release=2018.4.1.4&platform=All&function=all&source=fc

Workarounds and Mitigations

None