Multiple vulnerabilities in IBM CICS TX Standard



Published: 2023-09-28
Risk Low
Patch available YES
Number of vulnerabilities 2
CVE-ID CVE-2021-39028
CVE-2021-39038
CWE-ID CWE-74
CWE-451
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
IBM CICS TX Standard
Universal components / Libraries / Software for developers

Vendor IBM Corporation

Security Bulletin

This security bulletin contains information about 2 vulnerabilities.

1) Improper Neutralization of Special Elements in Output Used by a Downstream Component

EUVDB-ID: #VU81247

Risk: Low

CVSSv3.1: 4.7 [CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-39028

CWE-ID: CWE-74 - Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

Exploit availability: No

Description

The vulnerability allows a remote user to perform various attacks.

The vulnerability exists due to improper validation of input by the HOST headers. A remote user can conduct various attacks against the vulnerable system, including cross-site scripting, cache poisoning or session hijacking.

Mitigation

Install update from vendor's website.

Vulnerable software versions

IBM CICS TX Standard: before 11.1.0.0 ifix2

External links

http://www.ibm.com/support/pages/node/6595099


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Spoofing attack

EUVDB-ID: #VU60870

Risk: Low

CVSSv3.1: 3.7 [CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2021-39038

CWE-ID: CWE-451 - User Interface (UI) Misrepresentation of Critical Information (Clickjacking, spoofing)

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform clickjacking attack.

The vulnerability exists due to incorrect processing of user-supplied data, when REST API discovery is configured through the WebSphere administrative console Web Container settings to enable the API Discovery service, or through IBM WebSphere Application Server Liberty features mpOpenAPI-1.0, mpOpenAPI-1.1, mpOpenAPI-2.0, apiDiscovery-1.0, openapi-3.0 or openapi-3.1. A remote attacker can perform clickjacking attack.

Mitigation

Install update from vendor's website.

Vulnerable software versions

IBM CICS TX Standard: before 11.1.0.0 ifix2

External links

http://www.ibm.com/support/pages/node/6595099


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###