Command Injection in IBM WebSphere Application Server - CVE-2020-4163

 

Command Injection in IBM WebSphere Application Server - CVE-2020-4163

Published: February 5, 2020


Vulnerability identifier: #VU24938
CSH Severity: Medium
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2020-4163
CWE-ID: CWE-77
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: IBM Corporation
Affected software:
IBM WebSphere Application Server

Detailed vulnerability description

The vulnerability allows a remote user to execute arbitrary commands on the system.

The vulnerability exists due to improper input validation. A remote administrator can send a specially crafted file name which would be misinterpreted as jsp content and execute arbitrary commands.


How to mitigate CVE-2020-4163

Vendor recommends to install the following updates:

  • For V9.0.0.0 through 9.0.5.2:

Upgrade to minimal fix pack levels as required by interim fix and then apply Interim Fix PH20785
--OR--
Apply Fix Pack 9.0.5.3 or later (targeted availability 1Q2020).

  • For V8.5.0.0 through 8.5.5.16:

Upgrade to minimal fix pack levels as required by interim fix and then apply Interim Fix PH20785
--OR--
Apply Fix Pack 8.5.5.17 or later (targeted availability 1Q2020).

  • For V8.0.0.0 through 8.0.0.15:

Upgrade to 8.0.0.15 and then apply Interim Fix PH20785
 

  • For V7.0.0.0 through 7.0.0.45:
Upgrade to 7.0.0.45 and  then apply Interim Fix PH2078



Sources