IBM Support

Security Bulletin: Security Bulletin: Cross-Site Scripting (XSS) and Remote Code Execution Vulnerabilities Affecting Asset and Service Management (CVE-2015-0104, CVE-2015-0107, CVE-2015-0108, CVE-2015-0109)

Security Bulletin


Summary

There are cross-site scripting and remove code execution vulnerabilities in code that is used by Maximo Asset Management, Maximo Asset Management Essentials, Maximo Industry Solutions (including Maximo for Government, Maximo for Nuclear Power, Maximo for Transportation, Maximo for Life Sciences, Maximo for Oil and Gas and Maximo for Utilities), Tivoli Asset Management for IT, Tivoli Service Request Manager, Maximo Service Desk, and Change and Configuration Management Database.
.

Vulnerability Details

CVE-ID: CVE-2015-0104
DESCRIPTION:

Remote Code Execution vulnerability

CVSS Base Score: 4.90
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/99582 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:A/AC:M/Au:S/C:P/I:P/A:P)

CVE-ID: CVE-2015-0107

DESCRIPTION:

Directory Traversal vulnerability

CVSS Base Score: 2.30
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/99587 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:A/AC:M/Au:S/C:P/I:N/A:N)

CVE-ID: CVE-2015-0108

DESCRIPTION:

Cross-site Scripting vulnerability

CVSS Base Score: 3.50
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/99605 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:S/C:N/I:P/A:N)


CVE-ID: CVE-2015-0109

DESCRIPTION:

Cross-site Scripting vulnerability

CVSS Base Score: 3.50
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/99606 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:S/C:N/I:P/A:N)

Affected Products and Versions

1. Maximo Asset Management 7.1, 7.5, 7.6

2. Maximo Asset Management Essentials 7.1, 7.5
3. Maximo for Government 7.1, 7.5
4. Maximo for Nuclear Power 7.1, 7.5
5. Maximo for Transportation 7.1, 7.5
6. Maximo for Life Sciences 7.1, 7.5
7. Maximo for Oil and Gas 7.1, 7.5
8. Maximo for Utilities 7.1, 7.5
9. Tivoli Asset Management for IT 7.2, 7.1
10. Tivoli Service Request Manager 7.2, 7.1
11. Change and Configuration Management Database 7.2, 7.1

Remediation/Fixes

VENDOR FIXES:

The recommended solution is to download the appropriate Interim Fix or Fix Pack from Fix Central (What is Fix Central?) and apply for each affected product as soon as possible. Please see below for information on the fixes available for each product, version, and release. Follow the installation instructions in the ‘readme’ documentation provided with each fix pack or interim fix.

For Maximo Asset Management, Maximo Asset Management Essentials and Maximo Industry Solutions 7.1, 7.5, 7.6:

VRMF Fix Pack or Interim Fix Download
7.6.0.0 Maximo 7.6.0.0 Interim Fix:
7.6.0.0-TIV-MAM-IFIX002 or latest Interim Fix available
FixCentral
7.5.0.7 Maximo 7.5.0.7 Interim Fix:
7.5.0.7-TIV-MAM-IFIX003 or latest Interim Fix available
FixCentral
7.1.1.8 7.1.1.8 Interim Fix:
MBS_7118_LAFIX.20150119-1027 or latest Interim Fix available
Contact IBM Support

For Tivoli IT Asset Management for IT, Tivoli Service Request Manager, and Change and Configuration Management Database 7.2, 7.1
VRMF Fix Pack or Interim Fix Download
7.1-7.2 7.1.1.8 Interim Fix:
MBS_7118_LAFIX.20150119-1027 or latest Interim Fix available
Contact IBM Support

If assistance is needed in determining the appropriate Fix Pack or Interim Fix level, contact IBM Technical Support. It is recommended that you always request the latest available Fix Pack or Interim Fix.

Due to the threat posed by a successful attack, IBM strongly recommends that customers apply fixes as soon as possible.

Workarounds and Mitigations

Until you apply the fixes, it may be possible to reduce the risk of successful attack by restricting network protocols required by an attack. For attacks that require certain privileges or access to certain packages, removing the privileges or the ability to access the packages from unprivileged users may help reduce the risk of successful attack. Both approaches may break application functionality, so IBM strongly recommends that customers test changes on non-production systems. Neither approach should be considered a long-term solution as neither corrects the underlying problem.

Get Notified about Future Security Bulletins

References

Complete CVSS v2 Guide
On-line Calculator v2

Related information

IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog

Acknowledgement

The vulnerability was reported to IBM by ING Services, Jakub Palaczynski and Lukasz Plonka..

Change History

27 Mar 2015: Original Version Published

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.


Cross reference information
Segment Product Component Platform Version Edition
Systems and Asset Management Maximo Asset Management Essentials 7.5, 7.1.1
Systems and Asset Management Maximo for Government 7.1, 7.5
Systems and Asset Management Maximo for Nuclear Power 7.1, 7.5
Systems and Asset Management Maximo for Transportation 7.5, 7.1.0
Systems and Asset Management Maximo for Life Sciences 7.5, 7.1.0
Systems and Asset Management Maximo for Oil and Gas 7.5, 7.1.0
Systems and Asset Management Maximo for Utilities 7.5, 7.1.0
Systems and Asset Management Tivoli Asset Management for IT 7.1, 7.2
Systems and Asset Management Tivoli Service Request Manager 7.1, 7.2
Systems and Asset Management Tivoli Change and Configuration Management Database 7.1, 7.2

Document information

More support for: Maximo Asset Management

Software version: 7.1, 7.5, 7.6

Operating system(s): Platform Independent

Reference #: 1694974

Modified date: 30 March 2015


Translate this page: