Security Bulletin: Insufficient control over MIME types in Business Process Manager (BPM) and WebSphere Lombardi Edition document feature (CVE-2014-3075)
CVE ID: CVE-2014-3075
IBM BPM document management feature might allow a remote attacker to include arbitrary files. A remote attacker might upload a file from a remote system, which might be viewed in an iframe by other end users.
CVSS Base Score: 4.0
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/93817 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:S/C:N/I:P/A:N)
Affected Products and Versions
- IBM Business Process Manager Standard V7.5.x, 8.0.x, and 8.5.x
- IBM Business Process Manager Express V7.5.x, 8.0.x, and 8.5.x
- IBM Business Process Manager Advanced V7.5.x, 8.0.x, and 8.5.x
- IBM WebSphere Lombardi Edition V7.2.0.x
Install IBM Business Process Manager interim fix JR50092 as appropriate for your current IBM Business Process Manager or WebSphere Lombardi Edition version.
- IBM Business Process Manager Express
- IBM Business Process Manager Standard
- IBM Business Process Manager Advanced
- IBM WebSphere Lombardi Edition
If you are using earlier unsupported versions, IBM strongly recommends that you upgrade to a supported version.
The fix introduces additional functionality to the product with two server-side configuration options. One option is for file uploads and other option is for file downloads.
- A server-side configuration option is introduced, which allows you to specify an optional white-list of MIME types. MIME types that are included in the list are allowed for uploads, but all other MIME types are blocked from uploads.
- A server-side configuration option is introduced, which allows you to specify an optional black-list of MIME type mappings. Each MIME type mapping allows for a conversion to be made from a specific MIME type to a specific MIME type upon download.
The following example is a sample configuration of new options, which you can configure in the 100Custom.xml file:
<!-- mime type white list which specifies mime types accepted for -->
<!-- upload to document list or document attachment -->
<!-- specifies whether to allow a null mime type for upload -->
<!-- lists the mime types allowed for upload -->
<!-- mime type black list which specifies mappings from unacceptable -->
<!-- mime types to acceptable mime types for download from -->
<!-- document list or document attachment -->
<!-- will map text/html mime type to text/plain mime type -->
<!-- missing <to> element implies mapping to content/octet-stream -->
Note: The default configuration, which does not include the configuration information that is provided in the 100Custom.xml file, acts as a blacklist for the text/html MIME type and maps it to the text/plain MIME type. Providing a configuration in the 100Custom.xml file overrides the default configuration. As a result, for text/html to remain on the blacklist, it should be explicitly added to the 100Custom.xml file.
Workarounds and Mitigations
Get Notified about Future Security Bulletins
IBM strongly suggests that all System z customers be subscribed to the System z Security Portal to receive the latest critical System z security and integrity service. If you are not subscribed, see the instructions on the System z Security web site. Security and integrity APARs and associated fixes will be posted to this portal. IBM suggests reviewing the CVSS scores and applying all security or integrity fixes as soon as possible to minimize any potential risk.
ReferencesComplete CVSS v2 Guide
On-line Calculator v2
Related informationIBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog
2014-08-29 - initally published
2014-11-03 - updated summary and CVSS information (loweing CVSS from 6.5 to 4.0)
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.
|Business Integration||IBM Business Process Manager Standard||Security||AIX, Linux, Linux zSeries, Solaris, Windows||8.5.5, 22.214.171.124, 8.5, 126.96.36.199, 188.8.131.52, 8.0.1, 8.0, 184.108.40.206, 220.127.116.11, 7.5.1, 18.104.22.168, 7.5|
|Business Integration||IBM Business Process Manager Express||Security||Linux, Linux zSeries, Windows||8.5.5, 22.214.171.124, 8.5, 126.96.36.199, 188.8.131.52, 8.0.1, 8.0, 184.108.40.206, 220.127.116.11, 7.5.1, 18.104.22.168, 7.5|
|Business Integration||WebSphere Lombardi Edition||Security||AIX, HP-UX, Linux, Linux zSeries, Linux/x86, Solaris, Windows, Windows Vista, Windows XP||22.214.171.124, 126.96.36.199, 188.8.131.52, 184.108.40.206, 220.127.116.11, 7.2|
More support for:
IBM Business Process Manager Advanced
Software version: 7.5, 18.104.22.168, 7.5.1, 22.214.171.124, 126.96.36.199, 8.0, 8.0.1, 188.8.131.52, 184.108.40.206, 8.5, 220.127.116.11, 8.5.5
Operating system(s): AIX, Linux, Solaris, Windows, z/OS
Reference #: 1679979
Modified date: 03 November 2014