IBM Support

Security Bulletin: IBM Security Network Protection can be affected by Cross-Site Scripting and Symbol Denial of Service vulnerabilities in Ruby on Rails (CVE-2013-1854, CVE-2013-1857, CVE-2013-1855)

Flashes (Alerts)


Abstract

IBM Security Network Protection is affected by multiple vulnerabilities reported in Ruby on Rails. These vulnerabilities include multiple cross-site scripting and denial of service vulnerabilities that could be exploited remotely by an attacker with access to the Local Management Interface (LMI).

Content

Vulnerability Details:

The following information was provided by Ruby on Rails. In the case of IBM Security Network Protection, the Local Management Interface is affected. For the vulnerabilities identified below, they are remotely exploitable, no specialized knowledge is required, and authentication is not required.



CVE ID: CVE-2013-1854

DESCRIPTION:

The Active Record component in Ruby on Rails 2.3.x before 2.3.18, 3.1.x before 3.1.12, and 3.2.x before 3.2.13 processes certain queries by converting hash keys to symbols, which allows remote attackers to cause a denial of service via crafted input to a where method. An exploit could impact the availability of the system, but the integrity of data and confidentiality of information are not compromised.

CVSS Base Score: 5.0
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/82922 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P)



CVE ID: CVE-2013-1857

DESCRIPTION: Ruby on Rails is vulnerable to cross-site scripting, caused by improper validation of user-supplied input by the sanitize helper. A remote attacker could exploit this vulnerability using a specially-crafted URL to execute script in a victim's Web browser within the security context of the hosting Web site, once the URL is clicked. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials. An exploit could impact the integrity of data of the system, but the confidentiality of information and the availability are not compromised.


CVSS Base Score: 4.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/82923 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N)



CVE ID: CVE-2013-1855

DESCRIPTION: Ruby on Rails is vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A remote attacker could exploit this vulnerability using the sanitize_css method in Action Pack to execute script in a victim's Web browser within the security context of the hosting Web site, once the URL is clicked. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials. An exploit could impact the integrity of data of the system, but the confidentiality of information and the availability are not compromised.

CVSS Base Score: 4.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/82920 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N)


AFFECTED PRODUCTS AND VERSIONS:

Products: XGS 5000
Firmware versions: 5.0

REMEDIATION:

Upgrade the IBM Threat firmware to the version listed below:

· IBM Security Network Protection Firmware version 5.1



Contact IBM Security Systems Support (http://www-947.ibm.com/support/entry/portal/overview) to upgrade to the above required Firmware.

Workaround(s):
None

Mitigation(s):
None

REFERENCES:
· Complete CVSS Guide
· On-line Calculator V2
· CVE-2013-1854
· CVE-2013-1857
· CVE-2013-1855
· https://exchange.xforce.ibmcloud.com/vulnerabilities/82920
· https://exchange.xforce.ibmcloud.com/vulnerabilities/82923
· https://exchange.xforce.ibmcloud.com/vulnerabilities/82922


RELATED INFORMATION:
IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog


ACKNOWLEDGEMENT
None

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Flash.


Note: According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.




[{"Product":{"code":"SSHLHV","label":"IBM Security Network Protection"},"Business Unit":{"code":"BU059","label":"IBM Software w\/o TPS"},"Component":"Not Applicable","Platform":[{"code":"PF009","label":"Firmware"}],"Version":"5.0","Edition":"","Line of Business":{"code":"LOB24","label":"Security Software"}}]

Document Information

Modified date:
25 September 2022

UID

swg21646819