IBM Support

Security Bulletin: The BigFix Platform has vulnerabilities that have been addressed in patch releases

Security Bulletin


Summary

The BigFix Platform versions 9.5 and 9.2 have multiple security vulnerabilities that are fixed in 9.5.7 and 9.2.12

Vulnerability Details

CVEID: CVE-2017-1225
DESCRIPTION:
IBM BigFix Platform stores sensitive information in URL parameters. This may lead to information disclosure if unauthorized parties have access to the URLs via server logs, referrer header or browser history.
CVSS Base Score: 3.7
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/123904 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N)
CVEID: CVE-2017-1232
DESCRIPTION:
IBM BigFix Platform transmits sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors.
CVSS Base Score: 5.9
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/123911 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)


CVEID: CVE-2017-1220
DESCRIPTION:
IBM BigFix Platform discloses sensitive information to unauthorized users. The information can be used to mount further attacks on the system.
CVSS Base Score: 5.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/123860 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)

CVEID: CVE-2017-1230
DESCRIPTION:
IBM BigFix Platform uses insufficiently random numbers or values in a security context that depends on unpredictable numbers. This weakness may allow attackers to expose sensitive information by guessing tokens or identifiers.
CVSS Base Score: 5.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/123909 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)

CVEID: CVE-2017-1521
DESCRIPTION:
IBM BigFix Platform is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in WebReports thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
CVSS Base Score: 6.1
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/129831 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)

CVEID: CVE-2017-1228
DESCRIPTION:
IBM BigFix Platform could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable the secure cookie attribute. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques.
CVSS Base Score: 3.7
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/123907 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N)

CVEID: CVE-2017-1226
DESCRIPTION:
IBM BigFix Platform generates an error message in error logs that includes sensitive information about its environment which could be used in further attacks against the system.
CVSS Base Score: 4.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/123905 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)

CVEID: CVE-2017-1222
DESCRIPTION:
IBM BigFix Platform does not perform an authentication check for a critical resource or functionality allowing anonymous users access to protected areas.
CVSS Base Score: 6.5
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/123862 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)

CVEID: CVE-2017-1218
DESCRIPTION:
IBM BigFix Platform is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts.
CVSS Base Score: 4.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/123858 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N)

Affected Products and Versions

BigFix Platform 9.5, BigFix Platform 9.2

Remediation/Fixes

BigFix Platform 9.5 and 9.2

To remediate the below vulnerabilities please apply the upgrade-patch 9.5.7 or 9.2.12 respectively by looking for the associated upgrade-patch fixlet in the Console, launching and applying it.

    CVE-2017-1225, CVE-2017-1220, CVE-2017-1521: Affected components - Web Reports
    CVE-2017-1226: Affected Components - BigFix Server

For the below vulnerabilities, both the platform version and whether it's a new install or upgrade must be considered:

BigFix Platform 9.2:

To remediate the below vulnerability there are 2 cases to consider (Note: Already addressed in 9.5.6 and above):

CVE-2017-1218: Affected Components - WebReports, WebUI
    Case Set 1:
    BigFix Platform 9.2:
    To remediate this vulnerability there are 2 scenarios to cover:

    1) For the fresh install scenario, please use BigFix 9.2.12 or greater, then then add or edit a client setting on the system where the BigFix Server is installed:
    From the BigFix Console's "Edit Computer Settings..." dialog to set _HTTPServer_Referrer_CheckEnabled=1

    2) For the upgrade scenario, please apply the upgrade-patch 9.2.12 by looking for the associated upgrade-patch fixlet in the Console, launching and applying it, then add or edit a client setting on the system where the BigFix Server is installed:
    From the BigFix Console's "Edit Computer Settings..." dialog to set _HTTPServer_Referrer_CheckEnabled=1

    Case Set 2:
    WebUI:

    For customers on running WebUI (available on BigFix Platform 9.2.6 and greater) please refer to the following Security Bulletin for instructions on how to remediate the WebUI cases associated with this vulnerability (CVE-2017-1218) here: http://www-01.ibm.com/support/docview.wss?uid=swg22005246


To remediate the below vulnerability there are 3 cases to consider (Note: Already fixed in 9.5.6 and above):

CVE-2017-1222: Affected Components - BigFix Server, Relay, WebReports
    Case 1:
    (i) Missing Authentication for Critical Function - Generic
    (ii)Missing Authentication For Critical Function - Server/Relay - Relay diagnostic page is not authenticated

    To remediate this vulnerability please apply the upgrade-patch 9.2.12 by looking for the associated upgrade-patch fixlet in the Console, launching and applying it.

    The Relay Diagnostic page on the Servers and Relays will be disabled by default (i.e. if the _BESRelay_Diagnostics_Enable setting is not defined).

    It can be re-enabled by adding the client setting:
    _BESRelay_Diagnostics_Enable=1
    to each Server or Relay where the Relay Diagnostic page has to be re-enabled.

    The Relay Diagnostic Page can be configured to be password protected adding the additional client setting:
    _BESRelay_Diagnostics_Password that will include the password that has to be used.

    Case 2:
    (i) Missing Authentication For Critical Function - WebReports - wwwroot subtree accessible without authentication

    For the fresh install scenario, please use BigFix 9.2.12 or greater. For the upgrade scenario, please apply the upgrade-patch 9.2.12 by looking for the associated upgrade-patch fixlet in the Console, launching and applying it. In either case (after install or upgrade) stop the WebReports application, and add or edit the following WebReports setting on the system where the WebReports Server is installed.

    On Windows:
    Under
    HKLM\SOFTWARE\Wow6432Node\BigFix\Enterprise Server\BESReports
    add or edit the REG_SZ "ReportFilesCheck"=1

    On Linux:
    In the file /var/opt/BESWebReportsServer/beswebreports.config
    add or edit the configuration key:

    [SOFTWARE\BigFix\Enterprise Server\BESReports]
    ReportFilesCheck = 1

    After adding or editing the setting, restart the WebReports application.

    Case 3:

    (i) Missing Authentication For Critical Function - De-Registering a Client

    To remediate this vulnerability there are 2 scenarios to cover:

    1) For the fresh install scenario, please use BigFix 9.2.12 or greater, then follow the post configuration steps described below when the applicability conditions are satisfied

    2) For the upgrade scenario, please apply the upgrade-patch 9.2.12 by looking for the associated upgrade-patch fixlet in the Console, launching and applying it, then follow the post configuration steps described below when the applicability conditions are satisfied.

    Below are the post configuration steps to be followed on the System where the Primary BigFix Server is installed, in the scenarios where they are required.

    Update or set the new masthead parameter "minimumSupportedRelay=9.2.12" using the the following BESAdmin tool command::

    On Windows:
    BESAdmin.exe /minimumSupportedRelay=9.2.12 /sitePvkLocation=<LICENSE_PVK_FILE> /sitePvkPassword=<LICENSE_PVK_PWD>

    On Linux:
    /opt/BESServer/bin/BESAdmin.sh -minimumSupportedRelay=9.2.12 -sitePvkLocation=<LICENSE_PVK_FILE> -sitePvkPassword=<LICENSE_PVK_PWD>

    WARNING: The above masthead parameter has impact in the Relay registration process and can be used only if all the Servers and Relay components in the deployment are already at level 9.2.12 or greater.

    Please see the 9.2 Patch 12 Release notes and documentation for additional information about the minimumSupportedRelay parameter.

Get Notified about Future Security Bulletins

References

Complete CVSS v3 Guide
On-line Calculator v3

Related information

IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog

Acknowledgement

CVE-2017-1225, CVE-2017-1232 CVE-2017-1228, CVE-2017-1220, CVE-2017-1230, CVE-2017-1226, CVE-2017-1218 : Discovered by the IBM X-Force Ethical Hacking Team: Ron Craig, Warren Moynihan, Jonathan Fitz-Gerald, John Zuccato, Rodney Ryan, Chris Shepherd, Dmitriy Beryoza

CVE-2017-1222: Discovered by William Easton of Strawgate, LLC

Change History

October 23, 2017: Original version published

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

Document information

More support for: IBM BigFix Platform

Software version: 9.2, 9.5

Operating system(s): Platform Independent

Software edition: All Editions

Reference #: 2009673

Modified date: 24 October 2017