IBM Support

Security Bulletin: Encrypted passwords field available in result set of User record type (CVE-2012-2165)

Security Bulletin


Summary

The encrypted password field for a user is available to IBM Rational ClearQuest queries and can be displayed in a result set. This is an information disclosure that may assist an attacker in attempts to construct passwords that match that encrypted value.

Vulnerability Details

Subscribe to My Notifications to be notified of important product support alerts like this.
  • Follow this link for more information (requires login with your IBM ID)

CVE ID: CVE-2012-2165

Description: The ClearQuest user record contains a field for storing the encrypted password field for a user. This can be displayed to a user by including this field in a result set of a query on users. This password value is encrypted and the original password cannot be reconstructed from this encrypted value. However, an attacker could use this information disclosure to attempt to find other passwords that also encrypt to this value.

This defect only applies if the user is authenticated using ClearQuest Authentication. It does NOT apply if the user is authenticated using LDAP Authentication. This encrypted password value for LDAP Authentication is not a password.

The correction for this information disclosure is that the encrypted field will now display a sequence of asterisk characters, such as ********


CVSS Base Score: 3.5
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/75040 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:S/C:P/I:N/A:N)

Affected Products and Versions

Any supported platform.

Remediation/Fixes

Workarounds and Mitigations

Workaround:
Use LDAP authentication.

Mitigation:

Do not let untrusted users have ClearQuest accounts. Do not grant "All Users/Groups Visible" privilege to users in order to minimize the number of users accounts another user could query against.

Get Notified about Future Security Bulletins

References

Complete CVSS v2 Guide
On-line Calculator v2

Related information

IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog

Acknowledgement

None

Change History

* 17 August 2012 - X-Force re-evaluated and new, lower CVSS score resulted. Was 6, now 3.5
* 8 August 2012 - Original copy published

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

Related information

Help System cross-site scripting (CVE-2012-2161)
ClearQuest Web stack traces (CVE-2012-2168)
Web parameter - elevated privileges (CVE-2012-2164)
Help System Open Redirect (CVE-2012-2159)
Cross-Site Scripting(XSS) Vulnerability (CVE-2012-2205)

Document information

More support for: Rational ClearQuest
Query

Software version: 7.1.1, 7.1.1.1, 7.1.1.2, 7.1.1.3, 7.1.1.4, 7.1.1.5, 7.1.1.6, 7.1.1.7, 7.1.1.8, 7.1.1.9, 7.1.2, 7.1.2.1, 7.1.2.2, 7.1.2.3, 7.1.2.4, 7.1.2.5, 7.1.2.6, 8.0, 8.0.0.1, 8.0.0.2

Operating system(s): AIX, HP-UX, Linux, Solaris, Windows

Reference #: 1606385

Modified date: 17 August 2012