IBM Support

IT20451: EBICS CLIENT IS VULNERABLE TO SQL INJECTION

Subscribe

You can track all active APARs for this component.

 

APAR status

  • Closed as program error.

Error description

  • Additional SQL code is executed if EBICS client GET http
    communication is maliciously injected.
    

Local fix

  • n/a
    

Problem summary

  • Users Affected:
    All users of EBICS Client
    
    Problem Description:
    A user logs into EBICS Client application (from IBM Sterling
    B2B Integrator Dashboard), goes to "File Format" under Profile
    management.
    Search the file formats and then manipulate the HTTP request
    with SQL injection. As a search result, you gain access to
    information.
    
    Platforms Affected:
    All
    

Problem conclusion

  • Resolution Summary:
    A code fix is provided.
    
    Delivered In:
    5020603_2
    5020500_16
    5020601_8
    

Temporary fix

Comments

APAR Information

  • APAR number

    IT20451

  • Reported component name

    STR B2B INTEGRA

  • Reported component ID

    5725D0600

  • Reported release

    525

  • Status

    CLOSED PER

  • PE

    NoPE

  • HIPER

    NoHIPER

  • Special Attention

    NoSpecatt / Xsystem

  • Submitted date

    2017-05-04

  • Closed date

    2017-06-08

  • Last modified date

    2017-08-04

  • APAR is sysrouted FROM one or more of the following:

  • APAR is sysrouted TO one or more of the following:

Fix information

  • Fixed component name

    STR B2B INTEGRA

  • Fixed component ID

    5725D0600

Applicable component levels

[{"Business Unit":{"code":"BU059","label":"IBM Software w\/o TPS"},"Product":{"code":"SS3JSW","label":"Sterling B2B Integrator"},"Platform":[{"code":"PF025","label":"Platform Independent"}],"Version":"5.2.5","Line of Business":{"code":"LOB59","label":"Sustainability Software"}}]

Document Information

Modified date:
11 September 2023