IBM Support

Security Bulletin: Insufficient control over MIME types in Business Process Manager (BPM) and WebSphere Lombardi Edition document feature (CVE-2014-3075)

Security Bulletin


Summary

You cannot restrict file uploads by MIME type in a document list coach view. As a result, potentially malicious files, such as HTML that contains embedded JavaScript can be uploaded and run in the browser.

Vulnerability Details

CVE ID: CVE-2014-3075
DESCRIPTION:
IBM BPM document management feature might allow a remote attacker to include arbitrary files. A remote attacker might upload a file from a remote system, which might be viewed in an iframe by other end users.

CVSS Base Score: 4.0
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/93817 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:S/C:N/I:P/A:N)

Affected Products and Versions

  • IBM Business Process Manager Standard V7.5.x, 8.0.x, and 8.5.x
  • IBM Business Process Manager Express V7.5.x, 8.0.x, and 8.5.x
  • IBM Business Process Manager Advanced V7.5.x, 8.0.x, and 8.5.x
  • IBM WebSphere Lombardi Edition V7.2.0.x

Remediation/Fixes

Install IBM Business Process Manager interim fix JR50092 as appropriate for your current IBM Business Process Manager or WebSphere Lombardi Edition version.


If you are using earlier unsupported versions, IBM strongly recommends that you upgrade to a supported version.

The fix introduces additional functionality to the product with two server-side configuration options. One option is for file uploads and other option is for file downloads.
  • A server-side configuration option is introduced, which allows you to specify an optional white-list of MIME types. MIME types that are included in the list are allowed for uploads, but all other MIME types are blocked from uploads.
  • A server-side configuration option is introduced, which allows you to specify an optional black-list of MIME type mappings. Each MIME type mapping allows for a conversion to be made from a specific MIME type to a specific MIME type upon download.

The following example is a sample configuration of new options, which you can configure in the 100Custom.xml file:

<server>
  <!-- mime type white list which specifies mime types accepted for -->
  <!-- upload to document list or document attachment -->
  <document-attachment-accepted-mime-types>
    <!-- specifies whether to allow a null mime type for upload -->
    <allow-null-mime-type>false</allow-null-mime-type>
    <!-- lists the mime types allowed for upload -->
    <mime-type>text/plain</mime-type>
    <mime-type>img/png</mime-type>
  </document-attachment-accepted-mime-types>
   
  <!-- mime type black list which specifies mappings from unacceptable -->
  <!-- mime types to acceptable mime types for download from -->
  <!-- document list or document attachment -->
  <document-attachment-download-mime-types>
    <!-- will map text/html mime type to text/plain mime type -->
    <mime-type-map>
      <from>text/html</from>
      <to>text/plain</to>
    </mime-type-map>
    <!-- missing <to> element implies mapping to content/octet-stream -->
    <mime-type-map>
      <from>application/pdf</from>
      </mime-type-map>
  </document-attachment-download-mime-types>
</server>

Note: The default configuration, which does not include the configuration information that is provided in the 100Custom.xml file, acts as a blacklist for the text/html MIME type and maps it to the text/plain MIME type. Providing a configuration in the 100Custom.xml file overrides the default configuration. As a result, for text/html to remain on the blacklist, it should be explicitly added to the 100Custom.xml file.

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

Important note

IBM strongly suggests that all System z customers be subscribed to the System z Security Portal to receive the latest critical System z security and integrity service. If you are not subscribed, see the instructions on the System z Security web site. Security and integrity APARs and associated fixes will be posted to this portal. IBM suggests reviewing the CVSS scores and applying all security or integrity fixes as soon as possible to minimize any potential risk.

References

Complete CVSS v2 Guide
On-line Calculator v2

Related information

IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog

Change History

2014-08-29 - initally published
2014-11-03 - updated summary and CVSS information (loweing CVSS from 6.5 to 4.0)

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

Cross reference information
Segment Product Component Platform Version Edition
Business Integration IBM Business Process Manager Standard Security AIX, Linux, Linux zSeries, Solaris, Windows 8.5.5, 8.5.0.1, 8.5, 8.0.1.2, 8.0.1.1, 8.0.1, 8.0, 7.5.1.2, 7.5.1.1, 7.5.1, 7.5.0.1, 7.5
Business Integration IBM Business Process Manager Express Security Linux, Linux zSeries, Windows 8.5.5, 8.5.0.1, 8.5, 8.0.1.2, 8.0.1.1, 8.0.1, 8.0, 7.5.1.2, 7.5.1.1, 7.5.1, 7.5.0.1, 7.5
Business Integration WebSphere Lombardi Edition Security AIX, HP-UX, Linux, Linux zSeries, Linux/x86, Solaris, Windows, Windows Vista, Windows XP 7.2.0.5, 7.2.0.4, 7.2.0.3, 7.2.0.2, 7.2.0.1, 7.2

Product Alias/Synonym

BPM

Document information

More support for: IBM Business Process Manager Advanced
Security

Software version: 7.5, 7.5.0.1, 7.5.1, 7.5.1.1, 7.5.1.2, 8.0, 8.0.1, 8.0.1.1, 8.0.1.2, 8.5, 8.5.0.1, 8.5.5

Operating system(s): AIX, Linux, Solaris, Windows, z/OS

Reference #: 1679979

Modified date: 03 November 2014