IBM Support

Security Bulletin: Shell command injection and cross-site scripting vulnerabilities in Access Manager for Mobile and Access Manager for Web (CVE-2014-4823, CVE-2014-6079)

Security Bulletin


Summary

IBM Security Access Manager for Mobile and IBM Security Access Manager for Web could be affected by a command injection vulnerability and allow a cross site scripting attack.

Vulnerability Details


The following vulnerabilities affect both IBM Security Access Manager for Mobile and IBM Security Access Manager for Web.

CVE-ID: CVE-2014-4823

DESCRIPTION: An attacker may be able to input strings that would be interpreted as system commands.

The vulnerability can be accessed from a remote network, is of low complexity and does not require authentication. A successful exploit could completely compromise the confidentiality of the system, could completely compromise the integrity of the system and could completely compromise the accessibility of the system.

CVSS Base Score: 10.0
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/95573 for more information
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:N/C:C/I:C/A:C)



CVE-ID: CVE-2014-6079

DESCRIPTION: An attacker may be able to trick a user of the Local Management Interface into executing unintended commands.

The vulnerability can be accessed from a remote network, is of medium complexity and does not require authentication. A successful exploit could not compromise the confidentiality of the system, could partially compromise the integrity of the system and could not compromise the accessibility of the system.

CVSS Base Score: 4.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/95763 for more information
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N)

Affected Products and Versions

IBM Security Access Manager for Mobile 8. - Firmware versions 8.0.0.0, 8.0.0.1, 8.0.0.3, and 8.0.0.4.
IBM Security Access Manager for Web 7.0 and 8.0 - Firmware versions 7.0, 7.0.0.1, 7.0.0.2, 7.0.0.3, 7.0.0.4, 7.0.0.5, 7.0.0.6, 7.0.0.7, 7.0.0.8, 8.0.0.2, 8.0.0.3, and 8.0.0.4.

Remediation/Fixes

IBM has provided patches for all affected versions. Follow the installation instructions in the README files included with the patch.

ProductVRMFAPARRemediation/First Fix
IBM Security Access Manager for Mobile - 8.08.0.0.0
8.0.0.1
8.0.0.3
8.0.0.4
IV64910
IV64919
8.0.0-ISS-ISAM-FP0005
IBM Security Access Manager for Web - 8.0 8.0.0.2
8.0.0.3
8.0.0.4
IV64910
IV64919
8.0.0-ISS-WGA-FP0005
IBM Security Access Manager for Web - 7.0 7.0.0.0
7.0.0.1
7.0.0.2
7.0.0.3

7.0.0.4
7.0.0.5
7.0.0.6
7.0.0.7

7.0.0.8
IV64910
IV64919
7.0.0-ISS-WGA-IF0009

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

References

Off

Acknowledgement

IBM Security Systems Ethical Hacking Team: Paul Ionescu, Brennan Brazeau, John Zuccato, Jonathan Fitz-Gerald, Warren Moynihan

Change History

29 September 2014: Original Version Published

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer

Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.

[{"Product":{"code":"SSELE6","label":"IBM Security Access Manager for Mobile"},"Business Unit":{"code":"BU059","label":"IBM Software w\/o TPS"},"Component":"--","Platform":[{"code":"PF016","label":"Linux"}],"Version":"8.0;8.0.0.1;8.0.0.2;8.0.0.3;8.0.0.4","Edition":"","Line of Business":{"code":"LOB24","label":"Security Software"}},{"Product":{"code":"SSPREK","label":"Tivoli Access Manager for e-business"},"Business Unit":{"code":"BU059","label":"IBM Software w\/o TPS"},"Component":" ","Platform":[{"code":"","label":""}],"Version":"","Edition":"","Line of Business":{"code":"LOB24","label":"Security Software"}}]

Document Information

Modified date:
16 June 2018

UID

swg21684466