IBM Support

Security Bulletin: Security Vulnerabilities Addressed in Asset and Service Mgmt

Security Bulletin


Summary

HTTP Response Splitting, Information Disclosure, SQL Injection, Security Bypass, Inadequate/Poor Input Control, Cross Site Scripting, and Gain Privileges vulnerabilities in Maximo Asset Mgmt, Tivoli Asset Mgmt for IT, Tivoli Service Request Mgr, Change and Configuration Mgmt Database, and SmartCloud Control Desk. See Vulnerability Details for CVE IDs.

Vulnerability Details

DESCRIPTION:
Customers who have Maximo Asset Management, Maximo Asset Management Essentials, Maximo Industry Solutions (including Maximo for Government, Maximo for Nuclear Power, Maximo for Transportation, Maximo for Life Sciences, Maximo for Oil and Gas and Maximo for Utilities), Tivoli Asset Management for IT, Tivoli Service Request Manager, Maximo Service Desk, Change and Configuration Management Database, and SmartCloud Control Desk are potentially impacted by these vulnerabilities, which can cause issues related to confidentiality, integrity, and availability.

CVE-2013-0451
CVSS Base Score: 6.5
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/80967
CVSS Environmental Score*: Undefined
CVSS Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P
APAR: IV24726
Description: SQL injection in the List Page Description filter.

CVE-2012-3333
CVSS Base Score: 4.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/78145
CVSS Environmental Score*: Undefined
CVSS Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
APAR: IV26377
Description: HTTP Response splitting using url parameters.

CVE-2013-2998
CVSS Base Score: 3.5
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/84841
CVSS Environmental Score*: Undefined
CVSS Vector: AV:N/AC:M/Au:S/C:P/I:N/A:N
APAR: IV34110
Description: Information Disclosure from frontcontroller.jsp response to invalid action_code.

CVE-2013-4016
CVSS Base Score: 6.5
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/85793
CVSS Environmental Score*: Undefined
CVSS Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P
APAR: IV41871
Description: SQL Injection with Birt reports where clause posted in plain text.

CVE-2013-5464
CVSS Base Score: 4.9
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/88362
CVSS Environmental Score*: Undefined
CVSS Vector: AV:N/AC:M/Au:S/C:P/I:P/A:N
APAR: IV46277
Description: Security Bypass for adjusting physical counts on restricted storerooms.

CVE-2013-5465
CVSS Base Score: 4.0
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/88364
CVSS Environmental Score*: Undefined
CVSS Vector: AV:N/AC:L/Au:S/C:N/I:P/A:N
APAR: IV46511
Description: Inadequate/Poor Input Control with invalid file types can be uploaded to server.

CVE-2013-5460
CVSS Base Score: 3.5
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/88308
CVSS Environmental Score*: Undefined
CVSS Vector: AV:N/AC:M/Au:S/C:P/I:N/A:N
APAR: IV46745
Description: Security Bypass with communication logs revealed for unrelated records.

CVE-2013-5402
CVSS Base Score: 3.5
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/87298
CVSS Environmental Score*: Undefined
CVSS Vector: AV:N/AC:M/Au:S/C:N/I:P/A:N
APAR: IV49268
Description: Cross Site Scripting with script embedded in user display name.

CVE-2013-6741
CVSS Base Score: 3.5
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/89857
CVSS Environmental Score*: Undefined
CVSS Vector: AV:N/AC:M/Au:S/C:P/I:N/A:N
APAR: IV50316
Description: Information Disclosure with Birt error stack trace returned to user.

CVE-2014-0824
CVSS Base Score: 3.5
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/90500
CVSS Environmental Score*: Undefined
CVSS Vector: AV:N/AC:M/Au:S/C:N/I:P/A:N
APAR: IV52829
Description: Cross Site Scripting with script embedded in attachment URL.

CVE-2014-0825
CVSS Base Score: 6.5
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/90501
CVSS Environmental Score*: Undefined
CVSS Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P
APAR: IV53362
Description: Cross Site Scripting with openreport.jsp report parameters.

CVE-2014-0849
CVSS Base Score: 3.5
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/90738
CVSS Environmental Score*: Undefined
CVSS Vector: AV:N/AC:M/Au:S/C:N/I:P/A:N
APAR: IV53952
Description: Gain Privileges with security restriction on two security groups for same user.

CVE-2014-0893
CVSS Base Score: 3.5
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/91287
CVSS Environmental Score*: Undefined
CVSS Vector: AV:N/AC:M/Au:S/C:N/I:P/A:N
APAR: IV55019
Description: Cross Site Scripting with customreport.jsp request parameters.

Affected Products and Versions

· Maximo Asset Management 7.5, 7.1, 6.2

· Maximo Asset Management Essentials 7.5, 7.1, 6.2
· Maximo for Government 7.5, 7.1, 6.2
· Maximo for Nuclear Power 7.5, 7.1, 6.2, 6.3
· Maximo for Transportation 7.5, 7.1, 6.2, 6.3
· Maximo for Life Sciences 7.5, 7.1, 6.2, 6.4, 6.5
· Maximo for Oil and Gas 7.5, 7.1, 6.2, 6.3, 6.4
· Maximo for Utilities 7.5, 7.1, 6.2, 6.3
· SmartCloud Control Desk 7.5
· Tivoli Asset Management for IT 7.2, 7.1, 6.2
· Tivoli Service Request Manager 7.2, 7.1, Maximo Service Desk 6.2
· Change and Configuration Management Database 7.2, 7.1

Products Listed Above
CVE APAR 7.5 7.1 / 7.2 6.2 - 6.5
CVE-2013-0451 IV24726 Fixed Fixed Fixed
CVE-2012-3333 IV26377 Fixed Fixed N/A
CVE-2013-2998 IV34110 Fixed Fixed N/A
CVE-2013-4016 IV41871 Fixed Fixed N/A
CVE-2013-5464 IV46277 Fixed N/A N/A
CVE-2013-5465 IV46511 Fixed Fixed N/A
CVE-2013-5460 IV46745 Fixed Fixed N/A
CVE-2013-5402 IV49268 Fixed Fixed N/A
CVE-2013-6741 IV50316 Fixed Fixed N/A
CVE-2014-0824 IV52829 N/A Fixed N/A
CVE-2014-0825 IV53362 Fixed Fixed N/A
CVE-2014-0849 IV53952 Fixed Fixed N/A
CVE-2014-0893 IV55019 Fixed N/A N/A
N/A in this table means that the vulnerability does not exist in that release

It is likely that earlier versions of affected products are also affected by these vulnerabilities. Remediation is not provided for product versions that are no longer supported. IBM recommends that customers upgrade to the latest supported version of products in order to obtain remediation for the vulnerabilities.

Remediation/Fixes

VENDOR FIXES:
The recommended solution is to download the appropriate Interim Fix or Fix Pack from Fix Central (What is Fix Central?) and apply for each affected product as soon as possible. Please see below for information on the fixes available for each product, version, and release. Follow the installation instructions in the ‘readme’ documentation provided with each fix pack or interim fix.

For Maximo Asset Management and Maximo Asset Management Essentials 7.5, 7.1, 6.2-6.5:

VRMF Fix Pack or Interim Fix Vulnerability APARs Download
7.5.0.6 Maximo 7.5.0.6 Fix Pack:
7.5.0.6-TIV-MAM-FP006
IV26377, IV34110, IV41871, IV46277, IV46511, IV46745, IV49268, IV50316, IV53362, IV53952, IV55019, IV24726 FixCentral
7.5.0.5 Maximo 7.5.0.5 Interim Fix:
7.5.0.5-TIV-MAM-IFIX006 or latest Interim Fix available
IV41871, IV49268, IV50316, IV53362, IV55019, IV24726 FixCentral
7.5.0.4 Maximo 7.5.0.4 Interim Fix:
7.5.0.4-TIV-MAM-IFIX011 or latest Interim Fix available
IV41871, IV46277, IV46511, IV24726 FixCentral
7.5.0.3 Maximo 7.5.0.3 Interim Fix:
7.5.0.3-TIV-MAM-IFIX027 or latest Interim Fix available
IV41871, IV46277, IV46511, IV49268, IV53952 FixCentral
7.1.1.12 7.1.1.12 Interim Fix:
MBS_71112_IFIX.20140321-1336 or latest Interim Fix available
IV41871, IV46511, IV49268, IV52829, IV53362, IV24726 Contact IBM Support
7.1.1.11 7.1.1.11 Interim Fix:
MBS_71111_IFIX.20140323-0749 or latest Interim Fix available
IV41871, IV46511, IV24726 Contact IBM Support
7.1.1.8 7.1.1.8 Interim Fix:
MBS_7118_LAFIX.20140319-0839 or latest Interim Fix available
IV52829 Contact IBM Support
7.1.1.7 7.1.1.7 Interim Fix:
MBS_7117_LAFIX.20140319-0837 or latest Interim Fix available
IV41871, IV50316 Contact IBM Support
6.2.8 6.2.8 Interim Fix:
Maximo_6.2.8_LAFix.20140117-1301 or latest Interim Fix available
IV24726 Contact IBM Support
6.2.7 6.2.7 Interim Fix:
Maximo_6.2.7_LAFix.20131003-0905 or latest Interim Fix available
IV24726 Contact IBM Support

For SmartCloud Control Desk 7.5:
VRMF Fix Pack or Interim Fix Vulnerability APARs Download
7.5.0.3 SmartCloud Control Desk 7.5.0.3 Fix Pack:
7.5.0.3-TIV-SCCD-AIX-FP0003
7.5.0.3-TIV-SCCD-Linux-FP0003
7.5.0.3-TIV-SCCD-Windows-FP0003
IV26377, IV34110, IV41871, IV46277, IV46511, IV46745, IV49268, IV50316, IV53362, IV53952, IV55019, IV24726 FixCentral
when available
7.5.1.2 SmartCloud Control Desk 7.5.1.2 Fix Pack:
7.5.1.2-TIV-SCCD-AIX-FP0012
7.5.1.2-TIV-SCCD-Linux-FP0012
7.5.1.2-TIV-SCCD-Windows-FP0012
IV26377, IV34110, IV41871, IV46277, IV46511, IV46745, IV49268, IV50316, IV53362, IV53952, IV55019, IV24726 FixCentral
when available

For Tivoli IT Asset Management for IT, Tivoli Service Request Manager, Maximo Service Desk, and Change and Configuration Management Database 7.2, 7.1, 6.2
VRMF Fix Pack or Interim Fix Vulnerability APARs Download
7.1.1.12 7.1.1.12 Interim Fix:
MBS_71112_IFIX.20140218-1510 or latest Interim Fix available
IV41871, IV46511, IV49268, IV52829, IV53362, IV24726 Contact IBM Support
7.1.1.11 7.1.1.11 Interim Fix:
MBS_71111_IFIX.20140207-1801 or latest Interim Fix available
IV41871, IV46511, IV24726 Contact IBM Support
7.1.1.8 7.1.1.8 Interim Fix:
MBS_7118_LAFIX.20140319-0839 or latest Interim Fix available
IV52829 Contact IBM Support
7.1.1.7 7.1.1.7 Interim Fix:
MBS_7117_LAFIX.20140319-0837 or latest Interim Fix available
IV41871, IV50316 Contact IBM Support
6.2.8 6.2.8 Interim Fix:
Maximo_6.2.8_LAFix.20140117-1301 or latest Interim Fix available
IV24726 Contact IBM Support
6.2.7 6.2.7 Interim Fix:
Maximo_6.2.7_LAFix.20131003-0905 or latest Interim Fix available
IV24726 Contact IBM Support

If assistance is needed in determining the appropriate Fix Pack or Interim Fix level, contact IBM Technical Support. It is recommended that you always request the latest available Fix Pack or Interim Fix.

Due to the threat posed by a successful attack, IBM strongly recommends that customers apply fixes as soon as possible.

Workarounds and Mitigations

Until you apply the fixes, it may be possible to reduce the risk of successful attack by restricting network protocols required by an attack. For attacks that require certain privileges or access to certain packages, removing the privileges or the ability to access the packages from unprivileged users may help reduce the risk of successful attack. Both approaches may break application functionality, so IBM strongly recommends that customers test changes on non-production systems. Neither approach should be considered a long-term solution as neither corrects the underlying problem.

Get Notified about Future Security Bulletins

References

Complete CVSS v2 Guide
On-line Calculator v2


Note: According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

Related information

IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog

Acknowledgement

None

Change History

Change History
18 Apr 2014 Flash published

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

Cross reference information
Segment Product Component Platform Version Edition
Systems and Asset Management Maximo Asset Management Essentials 7.5, 7.1.1
Systems and Asset Management Maximo for Government 6.1, 7.1, 7.5
Systems and Asset Management Maximo for Nuclear Power 6.3, 7.1, 7.5, 7.5.1
Systems and Asset Management Maximo for Transportation 7.1.1, 7.5, 7.5.1
Systems and Asset Management Maximo for Life Sciences 7.1.2, 7.5
Systems and Asset Management Maximo for Oil and Gas 7.1.2, 7.5, 7.5.1
Systems and Asset Management Maximo for Utilities 7.1.2, 7.5
Systems and Asset Management Tivoli Service Request Manager 7.1, 7.2, 7.2.1
Systems and Asset Management Tivoli Asset Management for IT 6.2, 6.2.1, 6.2.2, 6.2.3, 6.2.4, 6.2.7, 6.2.8, 7.1, 7.1.1, 7.2, 7.2.1, 7.2.2
Systems and Asset Management Tivoli Change and Configuration Management Database 7.1, 7.1.1, 7.2, 7.2.1
Systems and Asset Management Control Desk 7.5, 7.5.1

Document information

More support for: Maximo Asset Management

Software version: 6.2, 6.2.1, 6.2.2, 6.2.3, 6.2.4, 6.2.5, 6.2.6, 6.2.7, 6.2.8, 7.1.1, 7.5

Operating system(s): Platform Independent

Reference #: 1670870

Modified date: 02 September 2014


Translate this page: