IBM Support

Security Bulletin: Cross-site scripting vulnerabilities in IBM Business Process Manager (BPM) Process Portal (CVE-2015-0105)

Security Bulletin


Summary

IBM Business Process Manager is vulnerable to cross-site scripting, which is caused by the improper validation of user-supplied input. A remote attacker might exploit this vulnerability using a specially crafted URL to execute a script in a user's web browser within the security context of the hosting web site after the URL is clicked. An attacker might use this vulnerability to steal the user's cookie-based authentication credentials.

Vulnerability Details

CVEID: CVE-2015-0105

DESCRIPTION:
 IBM Business Process Manager is vulnerable to cross-site scripting, which is caused by the improper validation of user-supplied input. A remote attacker might exploit this vulnerability using a specially crafted URL to execute a script in a user's web browser within the security context of the hosting web site after the URL is clicked. An attacker might use this vulnerability to steal the user's cookie-based authentication credentials.
CVSS Base Score: 4.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/99583 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N)

Affected Products and Versions

  • IBM Business Process Manager Standard V8.0.x 8.5.x
  • IBM Business Process Manager Express V8.0.x 8.5.x
  • IBM Business Process Manager Advanced V8.0.x 8.5.x

Remediation/Fixes

Install the interim fix for APAR JR50607 as appropriate for your current IBM Business Process Manager. Please note that this fix is included in JR50162 on IBM Business Process Manager 8.5.0.1

  • IBM Business Process Manager Express
  • IBM Business Process Manager Standard
  • IBM Business Process Manager Advanced
  • Workarounds and Mitigations

    None

    Get Notified about Future Security Bulletins

    Important note

    IBM strongly suggests that all System z customers be subscribed to the System z Security Portal to receive the latest critical System z security and integrity service. If you are not subscribed, see the instructions on the System z Security web site. Security and integrity APARs and associated fixes will be posted to this portal. IBM suggests reviewing the CVSS scores and applying all security or integrity fixes as soon as possible to minimize any potential risk.

    References

    Complete CVSS v2 Guide
    On-line Calculator v2

    Related information

    IBM Secure Engineering Web Portal
    IBM Product Security Incident Response Blog

    Change History

    2015-03-13 - initial version published

    *The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

    Disclaimer

    According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.


    Cross reference information
    Segment Product Component Platform Version Edition
    Business Integration IBM Business Process Manager Standard Security AIX, Linux, Linux zSeries, Solaris, Windows 8.5.5, 8.5.0.1, 8.5, 8.0.1.3, 8.0.1.2, 8.0.1.1, 8.0.1, 8.0
    Business Integration IBM Business Process Manager Express Security Linux, Linux zSeries, Windows 8.5.5, 8.5.0.1, 8.5, 8.0.1.3, 8.0.1.2, 8.0.1.1, 8.0.1, 8.0

    Document information

    More support for: IBM Business Process Manager Advanced
    Security

    Software version: 8.0, 8.0.1, 8.0.1.1, 8.0.1.2, 8.0.1.3, 8.5, 8.5.0.1, 8.5.5

    Operating system(s): AIX, Linux, Solaris, Windows, z/OS

    Reference #: 1694937

    Modified date: 13 March 2015


    Translate this page: