Multiple vulnerabilities in IBM Sterling External Authentication Server



Published: 2023-09-04
Risk High
Patch available YES
Number of vulnerabilities 12
CVE-ID CVE-2023-26048
CVE-2023-26049
CVE-2023-21930
CVE-2022-40149
CVE-2022-40150
CVE-2022-45685
CVE-2022-45693
CVE-2023-1436
CVE-2023-32338
CVE-2022-40609
CVE-2020-13936
CVE-2023-29261
CWE-ID CWE-400
CWE-20
CWE-787
CWE-674
CWE-312
CWE-502
CWE-94
CWE-200
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
IBM Sterling External Authentication Server
Server applications / Other server solutions

Vendor IBM Corporation

Security Bulletin

This security bulletin contains information about 12 vulnerabilities.

1) Resource exhaustion

EUVDB-ID: #VU75218

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2023-26048

CWE-ID:

Exploit availability:

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to application does not properly control consumption of internal resources when processing multipart requests in request.getParameter(). A remote attacker can trigger resource exhaustion and perform a denial of service (DoS) attack.

Mitigation

Install update from vendor's website.

Vulnerable software versions

IBM Sterling External Authentication Server: before 6.1.0.0 iFix 04

Fixed software versions

CPE2.3 External links

http://www.ibm.com/support/pages/node/7029765


Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

2) Input validation error

EUVDB-ID: #VU75217

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2023-26049

CWE-ID:

Exploit availability:

Description

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to insufficient input validation when parsing cookies. A remote attacker can send a specially crafted HTTP request with a cookie value that starts with a double quote and force the application to read the cookie string until it sees a closing quote. Such behavior can be used to exfiltrate sensitive values from other cookies.

Mitigation

Install update from vendor's website.

Vulnerable software versions

IBM Sterling External Authentication Server: before 6.1.0.0 iFix 04

Fixed software versions

CPE2.3 External links

http://www.ibm.com/support/pages/node/7029765


Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

3) Improper input validation

EUVDB-ID: #VU75260

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2023-21930

CWE-ID:

Exploit availability:

Description

The vulnerability allows a remote non-authenticated attacker to read and manipulate data.

The vulnerability exists due to improper input validation within the JSSE component in Oracle GraalVM Enterprise Edition. A remote non-authenticated attacker can exploit this vulnerability to read and manipulate data.

Mitigation

Install update from vendor's website.

Vulnerable software versions

IBM Sterling External Authentication Server: before 6.1.0.0 iFix 04

Fixed software versions

CPE2.3 External links

http://www.ibm.com/support/pages/node/7029765


Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

4) Out-of-bounds write

EUVDB-ID: #VU69673

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2022-40149

CWE-ID:

Exploit availability:

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error when processing untrusted XML or JSON data. A remote attacker can pass specially crafted input to the application, trigger an out-of-bounds write and perform a denial of service (DoS) attack.

Mitigation

Install update from vendor's website.

Vulnerable software versions

IBM Sterling External Authentication Server: before 6.1.0.0 iFix 04

Fixed software versions

CPE2.3 External links

http://www.ibm.com/support/pages/node/7029765


Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

5) Resource exhaustion

EUVDB-ID: #VU69674

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2022-40150

CWE-ID:

Exploit availability:

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to application does not properly control consumption of internal resources when processing untrusted XML or JSON data. A remote attacker can trigger resource exhaustion and perform a denial of service (DoS) attack.

Mitigation

Install update from vendor's website.

Vulnerable software versions

IBM Sterling External Authentication Server: before 6.1.0.0 iFix 04

Fixed software versions

CPE2.3 External links

http://www.ibm.com/support/pages/node/7029765


Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

6) Out-of-bounds write

EUVDB-ID: #VU71108

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2022-45685

CWE-ID:

Exploit availability:

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack..

The vulnerability exists due to a boundary error when processing crafted JSON data. A remote attacker can pass specially crafted input to the application, trigger an out-of-bounds write and perform a denial of service (DoS) attack.

Mitigation

Install update from vendor's website.

Vulnerable software versions

IBM Sterling External Authentication Server: before 6.1.0.0 iFix 04

Fixed software versions

CPE2.3 External links

http://www.ibm.com/support/pages/node/7029765


Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

7) Out-of-bounds write

EUVDB-ID: #VU71109

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2022-45693

CWE-ID:

Exploit availability:

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack..

The vulnerability exists due to a boundary error when processing data passed via the map parameter. A remote attacker can pass specially crafted input to the application, trigger an out-of-bounds write and perform a denial of service (DoS) attack.

Mitigation

Install update from vendor's website.

Vulnerable software versions

IBM Sterling External Authentication Server: before 6.1.0.0 iFix 04

Fixed software versions

CPE2.3 External links

http://www.ibm.com/support/pages/node/7029765


Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

8) Uncontrolled Recursion

EUVDB-ID: #VU75431

Risk: Medium

CVSSv3.1:

CVE-ID: CVE-2023-1436

CWE-ID:

Exploit availability:

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to uncontrolled recursion when constructing a JSONArray from a Collection that contains a self-reference in one of its elements. A remote attacker can pass specially crafted data to the application and perform a denial of service (DoS) attack.

Mitigation

Install update from vendor's website.

Vulnerable software versions

IBM Sterling External Authentication Server: before 6.1.0.0 iFix 04

Fixed software versions

CPE2.3 External links

http://www.ibm.com/support/pages/node/7029765


Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

9) Cleartext storage of sensitive information

EUVDB-ID: #VU80326

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2023-32338

CWE-ID:

Exploit availability:

Description

The vulnerability allows a local attacker to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by the application. A local attacker can gain unauthorized access to sensitive information on the system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

IBM Sterling External Authentication Server: before 6.1.0.0 iFix 04

Fixed software versions

CPE2.3 External links

http://www.ibm.com/support/pages/node/7029765


Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

10) Deserialization of Untrusted Data

EUVDB-ID: #VU78901

Risk: High

CVSSv3.1:

CVE-ID: CVE-2022-40609

CWE-ID:

Exploit availability:

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to insecure input validation when processing serialized data. A remote attacker can pass specially crafted data to the application and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

IBM Sterling External Authentication Server: before 6.1.0.0 iFix 04

Fixed software versions

CPE2.3 External links

http://www.ibm.com/support/pages/node/7029765


Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

11) Code Injection

EUVDB-ID: #VU51511

Risk: High

CVSSv3.1:

CVE-ID: CVE-2020-13936

CWE-ID:

Exploit availability:

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to improper input validation. A remote attacker with ability to modify Velocity templates can inject and execute arbitrary Java code on the system with the same privileges as the account running the Servlet container.


Mitigation

Install update from vendor's website.

Vulnerable software versions

IBM Sterling External Authentication Server: before 6.1.0.0 iFix 04

Fixed software versions

CPE2.3 External links

http://www.ibm.com/support/pages/node/7029765


Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?

12) Information disclosure

EUVDB-ID: #VU80327

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2023-29261

CWE-ID:

Exploit availability:

Description

The vulnerability allows a local attacker to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by the application. A local attacker can gain unauthorized access to sensitive information on the system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

IBM Sterling External Authentication Server: before 6.1.0.0 iFix 04

Fixed software versions

CPE2.3 External links

http://www.ibm.com/support/pages/node/7029765


Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?



###SIDEBAR###