Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 6 |
CVE-ID | CVE-2021-28169 CVE-2021-34428 CVE-2021-28163 CVE-2021-28164 CVE-2021-34429 CVE-2021-28165 |
CWE-ID | CWE-20 CWE-613 CWE-200 CWE-284 CWE-400 |
Exploitation vector | Network |
Public exploit |
Public exploit code for vulnerability #4 is available. Public exploit code for vulnerability #5 is available. |
Vulnerable software |
IBM Customer and Network Analytics for Communications Service Providers and Datasets Server applications / Other server solutions IBM Analytic Accelerator Framework for Communication Service Providers Server applications / Frameworks for developing and running applications |
Vendor | IBM Corporation |
Security Bulletin
This security bulletin contains information about 6 vulnerabilities.
EUVDB-ID: #VU53973
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2021-28169
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to sensitive information..
The vulnerability exists due to a double decoding issue when parsing URI with certain characters. A remote attacker can send requests to the ConcatServlet
and WelcomeFilter
and view contents of protected resources within the WEB-INF directory.
Example:
/concat?/%2557EB-INF/web.xml
Install update from vendor's website.
Vulnerable software versionsIBM Customer and Network Analytics for Communications Service Providers and Datasets: 9.6.0.5.0 - 9.6.0.10.0
IBM Analytic Accelerator Framework for Communication Service Providers: 3.6.0.5.0 - 3.6.0.10.0
CPE2.3http://www.ibm.com/support/pages/node/7027483
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU55642
Risk: Low
CVSSv4.0: 0.4 [CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-34428
CWE-ID:
CWE-613 - Insufficient Session Expiration
Exploit availability: No
DescriptionThe vulnerability allows an attacker to gain access to sensitive information.
The vulnerability exists due to insufficient session expiration issue. If an exception is thrown from the SessionListener#sessionDestroyed() method, then the session ID is not invalidated in the session ID manager. On deployments with clustered sessions and multiple contexts this can result in a session not being invalidated.
MitigationInstall update from vendor's website.
Vulnerable software versionsIBM Customer and Network Analytics for Communications Service Providers and Datasets: 9.6.0.5.0 - 9.6.0.10.0
IBM Analytic Accelerator Framework for Communication Service Providers: 3.6.0.5.0 - 3.6.0.10.0
CPE2.3http://www.ibm.com/support/pages/node/7027483
Q & A
Can this vulnerability be exploited remotely?
No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU51878
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2021-28163
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application. If the ${jetty.base}
directory or the ${jetty.base}/webapps
directory is a symlink, the contents of the ${jetty.base}/webapps
directory may be deployed as a static web application, exposing the content of the directory for download.
Install update from vendor's website.
Vulnerable software versionsIBM Customer and Network Analytics for Communications Service Providers and Datasets: 9.6.0.5.0 - 9.6.0.10.0
IBM Analytic Accelerator Framework for Communication Service Providers: 3.6.0.5.0 - 3.6.0.10.0
CPE2.3http://www.ibm.com/support/pages/node/7027483
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU51877
Risk: Medium
CVSSv4.0: 8.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:A/U:Green]
CVE-ID: CVE-2021-28164
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: Yes
DescriptionThe vulnerability allows a remote attacker to gain access to sensitive informatoin.
The vulnerability exists due to insufficient validation of user-supplied input when processing special characters, passed via URI. A remote attacker can use %2e or %2e%2e segments to access protected resources within the WEB-INF directory.
Example:
http://[host]/context/%2e/WEB-INF/web.xml
MitigationInstall update from vendor's website.
Vulnerable software versionsIBM Customer and Network Analytics for Communications Service Providers and Datasets: 9.6.0.5.0 - 9.6.0.10.0
IBM Analytic Accelerator Framework for Communication Service Providers: 3.6.0.5.0 - 3.6.0.10.0
CPE2.3http://www.ibm.com/support/pages/node/7027483
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, a fully functional exploit for this vulnerability is available.
EUVDB-ID: #VU56964
Risk: Medium
CVSSv4.0: 8.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:A/U:Green]
CVE-ID: CVE-2021-34429
CWE-ID:
CWE-284 - Improper Access Control
Exploit availability: Yes
DescriptionThe vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper input validation when processing certain characters in URI. A remote attacker can send a specially crafted HTTP request with encoded characters in URI, bypass implemented security restrictions and access content of the WEB-INF directory.
MitigationInstall update from vendor's website.
Vulnerable software versionsIBM Customer and Network Analytics for Communications Service Providers and Datasets: 9.6.0.5.0 - 9.6.0.10.0
IBM Analytic Accelerator Framework for Communication Service Providers: 3.6.0.5.0 - 3.6.0.10.0
CPE2.3http://www.ibm.com/support/pages/node/7027483
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, a fully functional exploit for this vulnerability is available.
EUVDB-ID: #VU51876
Risk: Medium
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2021-28165
CWE-ID:
CWE-400 - Resource exhaustion
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to application does not properly control consumption of internal resources when processing large TLS frames. A remote attacker can send specially crafted data to the server, trigger CPU high load and perform a denial of service (DoS) attack.
MitigationInstall update from vendor's website.
Vulnerable software versionsIBM Customer and Network Analytics for Communications Service Providers and Datasets: 9.6.0.5.0 - 9.6.0.10.0
IBM Analytic Accelerator Framework for Communication Service Providers: 3.6.0.5.0 - 3.6.0.10.0
CPE2.3http://www.ibm.com/support/pages/node/7027483
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.