SB2023112425 - Multiple vulnerabilities in IBM Watson Machine Learning Accelerator on Cloud Pak for Data



SB2023112425 - Multiple vulnerabilities in IBM Watson Machine Learning Accelerator on Cloud Pak for Data

Published: November 24, 2023

Security Bulletin ID SB2023112425
Severity
High
Patch available
YES
Number of vulnerabilities 7
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 43% Medium 57%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 7 secuirty vulnerabilities.


1) Input validation error (CVE-ID: CVE-2022-23529)

The vulnerability allows a remote attacker to execute arbitrary code on the system.

The vulnerability exists due to insufficient validation of user-supplied input in jwt.verify function. A remote attacker can pass specially crafted input to the application and execute arbitrary code on the target system.


2) Use of a broken or risky cryptographic algorithm (CVE-ID: CVE-2022-23539)

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to insecure key types are used for signature verification. A remote user can enable legacy keys usage.


3) Use of a broken or risky cryptographic algorithm (CVE-ID: CVE-2022-23540)

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to insecure default algorithm in jwt.verify(). A remote attacker can cause signature validation bypass.


4) Use of a broken or risky cryptographic algorithm (CVE-ID: CVE-2022-23541)

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to insecure implementation of key retrieval function. A remote user attacker can cause successful validation of forged tokens.


5) Improper input validation (CVE-ID: CVE-2022-45690)

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the Security Framework (JSON-java) component in Oracle WebCenter Portal. A remote non-authenticated attacker can exploit this vulnerability to perform a denial of service (DoS) attack.


6) Prototype pollution (CVE-ID: CVE-2022-46175)

The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.

The vulnerability exists due to insufficient sanitization of user-supplied data within the JSON5.parse() function. A remote attacker can inject and execute arbitrary script code.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.


7) Prototype pollution (CVE-ID: CVE-2022-4742)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to improper input validation when processing slashes. A remote attacker can send a specially crafted request and execute arbitrary JavaScript code on the target system.


Remediation

Install update from vendor's website.