IBM Support

Security Bulletin: Apache Commons FileUpload Vulnerability Can Affect IBM Sterling Order Management (CVE-2016-1000031)

Security Bulletin


Summary

IBM Sterling Order Management uses Apache Commons FileUpload and is affected by some of the vulnerabilities that exist in Apache Commons FileUpload.

Vulnerability Details

CVEID: CVE-2016-1000031
DESCRIPTION: Apache Commons FileUpload, as used in Novell NetIQ Sentinel and other products, could allow a remote attacker to execute arbitrary code on the system, caused by deserialization of untrusted data in DiskFileItem class of the FileUpload library. A remote attacker could exploit this vulnerability to execute arbitrary code under the context of the current process.
CVSS Base Score: 9.8
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/117957 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

Affected Products and Versions

IBM Sterling Selling and Fulfillment Foundation 9.1.0 through 10.0

Remediation/Fixes

The recommended solution is to apply the security fix pack (SFP) as soon as practical. Please see below for information about the available fixes.

Product

Security Fix Pack*

Remediation/First Fix

IBM Sterling Selling and Fulfillment Foundation 10.0 10.0-SFP1 Fix Central - Select appropriate VRMF

IBM Sterling Selling and Fulfillment Foundation 9.5.0

9.5.0-SFP4

Fix Central - Select appropriate VRMF

IBM Sterling Selling and Fulfillment Foundation 9.4.0

9.4.0-SFP5

Fix Central - Select appropriate VRMF

IBM Sterling Selling and Fulfillment Foundation 9.3.0

9.3.0-SFP7

Fix Central - Select appropriate VRMF

IBM Sterling Selling and Fulfillment Foundation 9.2.1

9.2.1- SFP8

Fix Central - Select appropriate VRMF

IBM Sterling Selling and Fulfillment Foundation 9.2.0

9.2.0- SFP8

Fix Central - Select appropriate VRMF

IBM Sterling Selling and Fulfillment Foundation 9.1.0

9.1.0- SFP8

Fix Central - Select appropriate VRMF

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

References

Off

Change History

07 February 2019: Original document published

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer

Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.

Document Location

Worldwide

[{"Business Unit":{"code":"BU059","label":"IBM Software w\/o TPS"},"Product":{"code":"SS6PEW","label":"Sterling Order Management"},"Component":"","Platform":[{"code":"PF016","label":"Linux"},{"code":"PF033","label":"Windows"}],"Version":"All Versions","Edition":"","Line of Business":{"code":"LOB59","label":"Sustainability Software"}}]

Document Information

Modified date:
07 February 2019

UID

ibm10870454