SB2024122755 - Multiple vulnerabilities in IBM Security QRadar Log Management AQL Plugin



SB2024122755 - Multiple vulnerabilities in IBM Security QRadar Log Management AQL Plugin

Published: December 27, 2024

Security Bulletin ID SB2024122755
Severity
High
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

High 33% Low 67%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Inefficient regular expression complexity (CVE-ID: CVE-2024-45296)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient input validation when processing untrusted input with a regular expressions. A remote attacker can pass specially crafted data to the application and perform regular expression denial of service (ReDos) attack.


2) Information disclosure (CVE-ID: CVE-2024-8986)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to the Grafana plugin SDK bundles build metadata into the binaries it compiles. This metadata includes the repository URI for the plugin being built, as retrieved by running git remote get-url origin. If credentials are included in the repository URI (for instance, to allow for fetching of private dependencies), the final binary will contain the full URI, including said credentials.


3) Prototype pollution (CVE-ID: CVE-2024-21489)

The vulnerability allows a remote attacker to execute arbitrary JavaScript code.

The vulnerability exists due to improper input validation within the uplot.assign() function. A remote attacker can pass specially crafted input to the application and perform prototype pollution, which can result in information disclosure or data manipulation.


Remediation

Install update from vendor's website.