IBM Support

SECURITY BULLETIN: Webmin as used in IBM QRadar SIEM is vulnerable to Execute code as root. (CVE-2015-2011)

Security Bulletin


Summary

The xmlrpc.cgi Webmin script allows arbitrary command execution and escalation of privileges.

Vulnerability Details

CVE-ID: CVE-2015-2011

Description: IBM QRadar could allow an authenticated user to execute code as root.

CVSS Base Score:8.5
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/103922 for the current score
CVSS Environmental Score:*Undefined
CVSS Vector:AV:N/AC:M/Au:S/C:C/I:C/A:C

Affected Products and Versions

· IBM QRadar SIEM 7.2.x.

· IBM QRadar SIEM 7.1 MR2 Patch 1 to Patch 10

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

References

Off

Acknowledgement

IBM X-Force Ethical Hacking Team: Paul Ionescu, Warren Moynihan, Jonathan Fitz-Gerald, John Zuccato.

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer

Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.

[{"Product":{"code":"SSBQAC","label":"IBM Security QRadar SIEM"},"Business Unit":{"code":"BU059","label":"IBM Software w\/o TPS"},"Component":"Not Applicable","Platform":[{"code":"PF016","label":"Linux"}],"Version":"7.1;7.2","Edition":"All Editions","Line of Business":{"code":"LOB24","label":"Security Software"}}]

Document Information

Modified date:
16 June 2018

UID

swg21965817