Lucene search

K
ibmIBME7E8DFAF52DF5127D14C38AA1D1CCDB64D99C84C8FEB732310D39A18182B2B5D
HistoryJun 15, 2018 - 7:02 a.m.

Security Bulletin: Cross-site scripting vulnerability in IBM Business Process Manager (BPM) Process Inspector (CVE-2014-6173)

2018-06-1507:02:08
www.ibm.com
11

EPSS

0.001

Percentile

36.6%

Summary

Insufficient user input validation in IBM Business Process Manager’s Process Inspector can lead to a cross-site scripting exposure.

Vulnerability Details

CVE ID:CVE-2014-6173
CVSS Base Score: 3.5
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/98418&gt; for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:S/C:N/I:P/A:N)

IBM Business Process Manager is vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A remote attacker could exploit this vulnerability using a specially-crafted URL to execute script in a victim’s Web browser within the security context of the hosting Web site, once the URL is clicked. An attacker could use this vulnerability to steal the victim’s cookie-based authentication credentials.

Affected Products and Versions

    • IBM Business Process Manager Standard V8.0.x 8.5.x
  • IBM Business Process Manager Express V8.0.x 8.5.x
  • IBM Business Process Manager Advanced V8.0.x 8.5.x

Remediation/Fixes

Install the interim fix for APAR JR50241 as appropriate for your current IBM Business Process Manager version.

* [IBM Business Process Manager Express](&lt;http://www.ibm.com/support/fixcentral/swg/quickorder?parent=ibm%7EWebSphere&product=ibm/WebSphere/IBM+Business+Process+Manager+Express&release=All&platform=All&function=aparId&apars=JR50241&gt;)
* [IBM Business Process Manager Standard](&lt;http://www.ibm.com/support/fixcentral/swg/quickorder?parent=ibm%7EWebSphere&product=ibm/WebSphere/IBM+Business+Process+Manager+Standard&release=All&platform=All&function=aparId&apars=JR50241&gt;)
* [IBM Business Process Manager Advanced](&lt;http://www.ibm.com/support/fixcentral/swg/quickorder?parent=ibm%7EWebSphere&product=ibm/WebSphere/IBM+Business+Process+Manager+Advanced&release=All&platform=All&function=aparId&apars=JR50241&gt;)

Workarounds and Mitigations

The attack requires a user to access a malicious URL that the attacker has constructed for this purpose. Advise your users not to click links of unknown or untrusted origins.

EPSS

0.001

Percentile

36.6%

Related for E7E8DFAF52DF5127D14C38AA1D1CCDB64D99C84C8FEB732310D39A18182B2B5D