IBM Support

Security Bulletin: TRIRIGA Application Platform Authorization Bypass Vulnerability (CVE-2014-8895)

Flashes (Alerts)


Abstract

IBM TRIRIGA Application Platform could allow a remote attacker to view image files uploaded by other users through the use of a specially crafted URL.

Content

Vulnerability Details

CVEID: CVE-2014-8895

CVSS Base Score: 4.30
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/99014 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:P/I:N/A:N)

Affected Products and Versions
The following Application Platform versions are affected.
· IBM TRIRIGA Application Platform 3.4.1 and earlier versions
· IBM TRIRIGA Application Platform 3.3.2.2 and earlier versions
· IBM TRIRIGA Application Platform 3.2.1 and earlier versions


Remediation/Fixes
The recommended solution is to apply the fix for each named product as soon as practical. Please see below for information on the fixes available.

This vulnerability is resolved in the IBM TRIRIGA Application Platform fix packs 3.4.1.1, and 3.3.2.3. Due to the threat posed by a successful attack, IBM strongly recommends an upgrade to TRIRIGA Application Platform version 3.4.1.1 or 3.3.2.3. Anyone running IBM TRIRIGA Application Platform prior to 3.3.0 should contact customer support. Instructions on how to download and install the platform fix pack can be found here: IBM Fix Central Instructions on how to download and install IBM TRIRIGA Application Platform 3.4.1 can be found here:

http://www-01.ibm.com/support/docview.wss?uid=swg24038161

Workarounds and Mitigations
Until you apply the fixes, it may be possible to reduce the risk of successful attack by restricting network protocols required by an attack. For attacks that require certain privileges or access to certain packages, removing the privileges or the ability to access the packages from unprivileged users may help reduce the risk of successful attack. Both approaches may break application functionality, so IBM strongly recommends that customers test changes on non-production systems. Neither approach should be considered a long-term solution as neither corrects the underlying problem.

Get Notified about Future Security Bulletins

Subscribe to My Notifications to be notified of important product support alerts like this.

Reference
· On-line Calculator V2
. CVE Search

Related Information
IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog

Acknowledgement

Change History
05 January 2015 Original version published
01 October 2015 Fixed broken link to CVSS v2 Guide
05 October 2015 Removed broken CVE link.

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.


Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

[{"Product":{"code":"SSHEB3","label":"IBM TRIRIGA Application Platform"},"Business Unit":{"code":"BU059","label":"IBM Software w\/o TPS"},"Component":"IBM TRIRIGA Application Platform","Platform":[{"code":"PF025","label":"Platform Independent"}],"Version":"3.2.1;3.3.2;3.4.1","Edition":"","Line of Business":{"code":"LOB59","label":"Sustainability Software"}},{"Product":{"code":"SSHEB3","label":"IBM TRIRIGA Application Platform"},"Business Unit":{"code":"BU059","label":"IBM Software w\/o TPS"},"Component":" ","Platform":[{"code":"","label":""}],"Version":"","Edition":"","Line of Business":{"code":"LOB59","label":"Sustainability Software"}}]

Document Information

Modified date:
25 September 2022

UID

swg21694771