Lucene search

K
ibmIBMECB6ACE7287B794FD85455A40A44DAABF44DADA2A62E760F71F99BDB8400E9F1
HistorySep 26, 2022 - 5:45 a.m.

Security Bulletin: IBM Business Process Manager (BPM) Vulnerable URLs (CVE-2013-0581)

2022-09-2605:45:55
www.ibm.com
16
ibm business process manager
vulnerable urls
cross site scripting
cross site request forgery
link injection
phishing through frames
cve-2013-0581
security bulletin

CVSS2

3.5

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:S/C:N/I:P/A:N

EPSS

0.001

Percentile

35.7%

Abstract

When a dashboard is opened or a service is executed, a malicious attacker can intercept network requests from the client. Then, the attacker can modify the URL parameters of the request so that malicious code can be executed within the client browser.

Content

VULNERABILITY DETAILS:

DESCRIPTION:

The following URLs in IBM Business Process Manager are vulnerable to Cross Site Scripting, Cross Site Request Forgery, Link Injection and Phishing Through Frames attacks:
https://host_name:port_number/ProcessPortal/jsp/socialPortal/dashboard.jsp https://host_name:port_number/teamworks/executeServiceByName https://host_name:port_number/portal/jsp/viewAdHocReportWizard.do https://host_name:port_number/rest/bpm/wle/v1/process

**CVEID:*CVE-2013-0581
CVSS Base Score: 3.5
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/83333 for the current score
CVSS Environmental Score
: Undefined
CVSS Vector: (AV:N/AC:M/AU:S/C:N/I:P/A:N)

AFFECTED PRODUCTS AND VERSIONS:

  • IBM Business Process Manager Standard Versions 7.5.1.x, 8.0.0.x, 8.0.1.x
  • IBM Business Process Manager Express Versions 7.5.1.x,8.0.0.x, 8.0.1.x
  • IBM Business Process Manager Advanced Versions 7.5.1.x, 8.0.0.x, 8.0.1.x

REMEDIATION:

To prevent the attacks through the vulnerable URLs that were previously listed, apply a interim fix or fix pack that contains APAR JR45799 for IBM Business Process Manager.

Version APAR How to acquire fix
7.5.1.0 JR45799

Workaround(s):
None known; apply fix

Mitigation(s):
None

REFERENCES:

RELATED INFORMATION:
_IBM Secure Engineering Web Portal _
IBM Product Security Incident Response Blog

ACKNOWLEDGEMENT
N/A

CHANGE HISTORY
17 April 2013: Original Copy Published

_*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Flash. _

_Note: _According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an “industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response.” IBM PROVIDES THE CVSS SCORES “AS IS” WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

[{“Product”:{“code”:“SSFTDH”,“label”:“IBM Business Process Manager Standard”},“Business Unit”:{“code”:“BU053”,“label”:“Cloud \u0026 Data Platform”},“Component”:“Security”,“Platform”:[{“code”:“PF002”,“label”:“AIX”},{“code”:“PF016”,“label”:“Linux”},{“code”:“PF027”,“label”:“Solaris”},{“code”:“PF033”,“label”:“Windows”}],“Version”:“8.0.1;8.0;7.5.1”,“Edition”:“”,“Line of Business”:{“code”:“LOB45”,“label”:“Automation”}},{“Product”:{“code”:“SSFTBX”,“label”:“IBM Business Process Manager Express”},“Business Unit”:{“code”:“BU053”,“label”:“Cloud \u0026 Data Platform”},“Component”:“Security”,“Platform”:[{“code”:“PF016”,“label”:“Linux”},{“code”:“”,“label”:“Linux zSeries”},{“code”:“PF033”,“label”:“Windows”}],“Version”:“8.0.1;8.0;7.5.1”,“Edition”:“”,“Line of Business”:{“code”:“LOB45”,“label”:“Automation”}},{“Product”:{“code”:“SSFTN5”,“label”:“IBM Business Process Manager Advanced”},“Business Unit”:{“code”:“BU053”,“label”:“Cloud \u0026 Data Platform”},“Component”:“Security”,“Platform”:[{“code”:“PF002”,“label”:“AIX”},{“code”:“PF016”,“label”:“Linux”},{“code”:“”,“label”:“Linux zSeries”},{“code”:“PF027”,“label”:“Solaris”},{“code”:“PF033”,“label”:“Windows”}],“Version”:“8.0.1;8.0;7.5.1”,“Edition”:“”,“Line of Business”:{“code”:“LOB45”,“label”:“Automation”}}]

Product Synonym

BPM

Affected configurations

Vulners
Node
ibmbusiness_process_managerMatch8.0.1standard
OR
ibmbusiness_process_managerMatch8.0standard
OR
ibmbusiness_process_managerMatch7.5.1standard
OR
ibmbusiness_process_managerMatch8.0.1express
OR
ibmbusiness_process_managerMatch8.0express
OR
ibmbusiness_process_managerMatch7.5.1express
OR
ibmbusiness_process_managerMatch8.0.1advanced
OR
ibmbusiness_process_managerMatch8.0advanced
OR
ibmbusiness_process_managerMatch7.5.1advanced
VendorProductVersionCPE
ibmbusiness_process_manager8.0.1cpe:2.3:a:ibm:business_process_manager:8.0.1:*:*:*:standard:*:*:*
ibmbusiness_process_manager8.0cpe:2.3:a:ibm:business_process_manager:8.0:*:*:*:standard:*:*:*
ibmbusiness_process_manager7.5.1cpe:2.3:a:ibm:business_process_manager:7.5.1:*:*:*:standard:*:*:*
ibmbusiness_process_manager8.0.1cpe:2.3:a:ibm:business_process_manager:8.0.1:*:*:*:express:*:*:*
ibmbusiness_process_manager8.0cpe:2.3:a:ibm:business_process_manager:8.0:*:*:*:express:*:*:*
ibmbusiness_process_manager7.5.1cpe:2.3:a:ibm:business_process_manager:7.5.1:*:*:*:express:*:*:*
ibmbusiness_process_manager8.0.1cpe:2.3:a:ibm:business_process_manager:8.0.1:*:*:*:advanced:*:*:*
ibmbusiness_process_manager8.0cpe:2.3:a:ibm:business_process_manager:8.0:*:*:*:advanced:*:*:*
ibmbusiness_process_manager7.5.1cpe:2.3:a:ibm:business_process_manager:7.5.1:*:*:*:advanced:*:*:*

CVSS2

3.5

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:S/C:N/I:P/A:N

EPSS

0.001

Percentile

35.7%

Related for ECB6ACE7287B794FD85455A40A44DAABF44DADA2A62E760F71F99BDB8400E9F1