Multiple vulnerabilities in IBM Information Server



Published: 2018-06-05 | Updated: 2018-06-05
Risk Low
Patch available YES
Number of vulnerabilities 3
CVE-ID CVE-2018-1432
CVE-2018-1454
CWE-ID CWE-59
CWE-300
CWE-284
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
IBM InfoSphere Information Server for Cloud
Server applications / Other server solutions

IBM InfoSphere Information Server
Server applications / Database software

IBM InfoSphere Information Analyzer
Server applications / Database software

IBM InfoSphere Information Governance Catalog
Server applications / Database software

IBM InfoSphere Data Click
Server applications / Database software

IBM InfoSphere Metadata Asset Manager
Server applications / Database software

IBM InfoSphere Data Quality Exception Console
Server applications / Database software

IBM InfoSphere Data Quality Console
Server applications / Database software

IBM InfoSphere Information Server Business Glossary
Server applications / Database software

IBM InfoSphere Information Server Metadata Workbench
Server applications / Database software

IBM Information Server Framework
Server applications / Database software

Vendor IBM Corporation

Security Bulletin

This security bulletin contains information about 3 vulnerabilities.

1) Cross-frame scripting

EUVDB-ID: #VU13182

Risk: Low

CVSSv3.1: 5.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2018-1432

CWE-ID: CWE-59 - Improper Link Resolution Before File Access ('Link Following')

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute a cross-frame scripting (XFS) attack.

The weakness exists due to insufficient protections for HTML inline frames (iframes). A remote attacker can trick the victim into visiting a specially crafted website, load valid content from the target system within an HTML iframe and attempt to conduct cross-site scripting, cross-site request forgery, clickjacking, or phishing attacks.

Mitigation

Install update from vendor's website.

Vulnerable software versions

IBM InfoSphere Information Server for Cloud: 11.5 - 11.7

IBM InfoSphere Information Server: 11.3 - 11.7

IBM InfoSphere Information Analyzer: 11.5 - 11.7

IBM InfoSphere Information Governance Catalog: 11.3 - 11.7

IBM InfoSphere Data Click: 11.3 - 11.7

IBM InfoSphere Metadata Asset Manager: 11.3 - 11.7

IBM InfoSphere Data Quality Exception Console: 11.5 - 11.7

IBM InfoSphere Data Quality Console: 11.3

IBM InfoSphere Information Server Business Glossary: 9.1

IBM InfoSphere Information Server Metadata Workbench: 9.1

External links

http://www-01.ibm.com/support/docview.wss?uid=swg22014911


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Man-in-the-middle attack

EUVDB-ID: #VU13184

Risk: Low

CVSSv3.1: 3.2 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2018-1454

CWE-ID: CWE-300 - Channel Accessible by Non-Endpoint ('Man-in-the-Middle')

Exploit availability: No

Description

The vulnerability allows a remote attacker to conduct man-in-the-middle attack.

The vulnerability exists due to system does not properly enable HTTP Strict Transport Security. A remote attacker can conduct man-in-the-middle attack, intercept of the communication channel between the affected app and access arbitrary data.

Mitigation

Install update from vendor's website.

Vulnerable software versions

IBM InfoSphere Information Governance Catalog: 11.3 - 11.7

IBM InfoSphere Data Click: 11.3 - 11.7

IBM InfoSphere Information Server for Cloud: 11.5 - 11.7

External links

http://www-01.ibm.com/support/docview.wss?uid=swg22015222


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Privilege escalation

EUVDB-ID: #VU13183

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: N/A

CWE-ID: CWE-284 - Improper Access Control

Exploit availability: No

Description

The vulnerability allows a local attacker to gain elevated privileges on the target system.

The weakness exists due to improper access controls. A local attacker can escalate his privileges to administrator and perform further attacker.

Mitigation

Install update from vendor's website.

Vulnerable software versions

IBM Information Server Framework: 9.1 - 11.7

IBM InfoSphere Information Server for Cloud: 11.5 - 11.7

External links

http://www-01.ibm.com/support/docview.wss?uid=swg22005503


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected application in order to exploit this vulnerability.

The attacker would have to login to the system and perform certain actions in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###