IBM Support

Security Bulletin: IBM Sterling Order Management, IBM Sterling Configure, Price, Quote and Sterling Web Channel are affected by Apache Struts 2 security vulnerabilities

Security Bulletin


Summary

IBM Sterling Order Management, IBM Sterling Configure Price Quote and Sterling Web Channel use Apache Struts 2 and are affected by some of the vulnerabilities that exist in Apache Struts 2.
Now a vulnerability related to Apache Commons FileUpload version included with Apache Struts 2.

Vulnerability Details

  • CVEID: CVE-2014-0112

    Description:

    Apache Struts could allow a remote attacker to execute arbitrary code on the system, caused by an incomplete fix related to ParametersInterceptor and the failure to restrict access to the class parameter. An attacker could exploit this vulnerability using the class parameter to manipulate the ClassLoader used by the application server to execute arbitrary code on the system.

    CVSS Base Score: 7.5
    CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/92740 for more information
    CVSS Environmental Score*: Undefined
    CVSS Vector: (AV:N/AC:L/Au:N/C:P/I:P/A:P)
  • CVEID: CVE-2014-0113

    Description:

    Apache Struts could allow a remote attacker to execute arbitrary code on the system, caused by an incomplete fix related to CookieInterceptor and the failure to restrict access to the getClass() method. An attacker could exploit this vulnerability using CookieInterceptor when configured to accept all cookies to manipulate the ClassLoader used by the application server to execute arbitrary code on the system.

    CVSS Base Score: 7.5
    CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/92742 for more information
    CVSS Environmental Score*: Undefined
    CVSS Vector: (AV:N/AC:L/Au:N/C:P/I:P/A:P)
  • CVEID: CVE-2014-0094

    Description:

    Apache Struts could allow a remote attacker to bypass security restrictions, caused by an error in ParametersInterceptor. An attacker could exploit this vulnerability using the class parameter to manipulate the ClassLoader used by the application server.

    CVSS Base Score: 5
    CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/92205 for the current score
    CVSS Environmental Score*: Undefined
    CVSS Vector: (AV:N/AC:L/AU:N/C:N/I:P/A:N)
  • CVEID: CVE-2014-0050

    Description:

    Apache Commons FileUpload and Tomcat are vulnerable to a denial of service, caused by the improper handling of Content-Type HTTP header for multipart requests. By sending a specially-crafted request, an attacker could exploit this vulnerability to cause the application to enter into an infinite loop.

    CVSS Base Score: 5
    CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/90987 for the current score
    CVSS Environmental Score*: Undefined
    CVSS Vector: (AV:N/AC:L/AU:N/C:N/I:N/A:P)

Affected Products and Versions

Sterling Order Management 8.5
IBM Sterling Selling and Fulfillment Foundation 9.0
IBM Sterling Selling and Fulfillment Foundation 9.1.0
IBM Sterling Selling and Fulfillment Foundation 9.2.0
IBM Sterling Selling and Fulfillment Foundation 9.2.1
IBM Sterling Selling and Fulfillment Foundation 9.3.0
IBM Sterling Field Sales 9.0
IBM Sterling Field Sales 9.1.0
IBM Sterling Field Sales 9.2.0
IBM Sterling Field Sales 9.2.1
IBM Sterling Field Sales 9.3.0
Sterling Web Channel 9.0
Sterling Web Channel 9.1

Remediation/Fixes

The recommended solution is to apply the fix packs, the security fix pack (SFP) as soon as practical. Please see below for information about the available fixes.

ProductSecurity Fix Pack*How to acquire fix
IBM Sterling Selling and Fulfillment Foundation 9.3.09.3.0- SFP2http://www-933.ibm.com/support/fixcentral/options

Select appropriate VRMF

IBM Sterling Selling and Fulfillment Foundation 9.2.19.2.1-SFP3http://www-933.ibm.com/support/fixcentral/options

Select appropriate VRMF

IBM Sterling Selling and Fulfillment Foundation 9.2.09.2.0- SFP3http://www-933.ibm.com/support/fixcentral/options

Select appropriate VRMF

IBM Sterling Selling and Fulfillment Foundation 9.1.09.1.0- SFP3http://www-933.ibm.com/support/fixcentral/options

Select appropriate VRMF

IBM Sterling Selling and Fulfillment Foundation 9.0.09.0.0- SFP3https://www14.software.ibm.com/webapp/iwm/web/reg/signup.do?source=swg-SterlngLegacyreq&lang=en_US
Sterling Order Management 8.58.5- SFP3https://www14.software.ibm.com/webapp/iwm/web/reg/signup.do?source=swg-SterlngLegacyreq&lang=en_US
IBM Sterling Field Sales 9.0SFS9.0-SFP3https://www14.software.ibm.com/webapp/iwm/web/reg/signup.do?source=swg-SterlngLegacyreq&lang=en_US
IBM Sterling Field Sales 9.1.0SFS9.1.0- SFP3http://www-933.ibm.com/support/fixcentral/options

Select appropriate VRMF

IBM Sterling Field Sales 9.2.0SFS9.2.0- SFP3http://www-933.ibm.com/support/fixcentral/options

Select appropriate VRMF

IBM Sterling Field Sales 9.2.1SFS9.2.1- SFP3http://www-933.ibm.com/support/fixcentral/options

Select appropriate VRMF

Sterling Web Channel9.0.0-FP6http://www-933.ibm.com/support/fixcentral/options

Select appropriate VRMF

Sterling Web Channel9.1.0- FP3http://www-933.ibm.com/support/fixcentral/options

Select appropriate VRMF

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

References

Off

Change History

18/06/2014 : Original Copy Published
08/07/2014: Removed Sterling Field Sales 9.3 and replaced with Sterling Selling and Fulfillment Foundation 9.3.0.
24/07/2014: Changes include:
- Added vulnerability CVE-2014-0050 under Vulnerability Details
- Added IBM Sterling Field Sales 9.3.0 under Affected Products and Versions and Remediation/Fixes
- Updated fix versions for following products under Remediation/Fixes. Old version in parentheses:
IBM Sterling Selling and Fulfillment Foundation 9.3.0 - (9.3.0- SFP1)
IBM Sterling Selling and Fulfillment Foundation 9.2.1 - (9.2.1- SFP2)
IBM Sterling Selling and Fulfillment Foundation 9.2.0 - (9.2.0- SFP2)
IBM Sterling Selling and Fulfillment Foundation 9.1.0 - (9.1.0- SFP2)
IBM Sterling Selling and Fulfillment Foundation 9.0.0 - (9.0.0- SFP2)
Sterling Order Management 8.5 - (8.5- SFP2)
IBM Sterling Field Sales 9.0 - (SFS9.0- SFP2)
IBM Sterling Field Sales 9.1.0 - (SFS9.1.0- SFP2)
IBM Sterling Field Sales 9.2.0 - (SFS9.2.0- SFP2)
IBM Sterling Field Sales 9.2.1 - (SFS9.2.1- SFP2)

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer

Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.

[{"Product":{"code":"SS6QYM","label":"Sterling Selling and Fulfillment Suite"},"Business Unit":{"code":"BU055","label":"Cognitive Applications"},"Component":"--","Platform":[{"code":"PF025","label":"Platform Independent"}],"Version":"9.2.1;9.2;9.1;9.0;8.5","Edition":"","Line of Business":{"code":"LOB59","label":"Sustainability Software"}}]

Document Information

Modified date:
11 February 2020

UID

swg21676706