Direct links to fixes
APAR status
Closed as fixed if next.
Error description
It is possible to retrieve the absolute path of the web server installation, which might help an attacker to develop further attacks and to gain information about the file system structure of the web application. One example that was found (out of several throughout the application): URL: https://<<SERVER>>>/birt/frameset? _docId=15691238&_langId=1&_primaryGroupId=10002490&_secondaryGro upId=100 8&__svg=false&__locale=en_US&__showtitle=false&_queryId=133972&_ _report= C:\IBM\Tririga350B\userfiles\birt\resources\15691238- 1452325440860\Balance_Sheet_Future_Accounting.rptdesign This is seen throughout the application.
Local fix
no
Problem summary
The BIRT framework allowed the full path to be passed in via a http parameter.
Problem conclusion
A security vulnerability was mitigated in BIRT report preview in which some server data was revealed. This is targeted to the 1H2016 mod release and 3.5.0.1 and 3.4.2.3 fix packs.
Temporary fix
Comments
APAR Information
APAR number
IV82438
Reported component name
TRI APP PLTFM R
Reported component ID
5725F26RE
Reported release
350
Status
CLOSED FIN
PE
NoPE
HIPER
NoHIPER
Special Attention
NoSpecatt / Xsystem
Submitted date
2016-03-08
Closed date
2016-03-28
Last modified date
2016-03-28
APAR is sysrouted FROM one or more of the following:
APAR is sysrouted TO one or more of the following:
Modules/Macros
999
Fix information
Applicable component levels
[{"Business Unit":{"code":"BU059","label":"IBM Software w\/o TPS"},"Product":{"code":"SSHEB3","label":"IBM TRIRIGA Application Platform"},"Component":"","ARM Category":[],"Platform":[{"code":"PF025","label":"Platform Independent"}],"Version":"350","Edition":"","Line of Business":{"code":"LOB59","label":"Sustainability Software"}}]
Document Information
Modified date:
30 March 2022