IBM Support

Security Bulletin: Jetty vulnerabilities found in IBM Sterling B2B Integrator and IBM Sterling File Gateway (CVE-2011-4461, CVS-2009-4612, CVE-2009-4611, CVE-2009-4610, CVS-2009-4609, CVE-2009-1524, CVE-2009-1523)

Security Bulletin


Summary

IBM Sterling B2B Integrator and IBM Sterling File Gateway use Jetty version 6.1.8. and thus are affected by the following security vulnerabilities discovered in the Jetty version 6.1.8

Vulnerability Details


CVEID: CVE-2011-4461

DESCRIPTION: Mort Bay Jetty 6.1.8 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters.

CVSS Base Score: 5
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/72017 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P)

CVEID: CVE-2009-4612

DESCRIPTION: Multiple cross-site scripting (XSS) vulnerabilities in the WebApp JSP Snoop page in Mort Bay Jetty 6.1.8 allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO to the default URI under (1) jspsnoop/, (2) jspsnoop/ERROR/, and (3) jspsnoop/IOException/, and possibly the PATH_INFO to (4) snoop.jsp.

CVSS Base Score: 4.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/55652 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N)

CVEID: CVE-2009-4611

DESCRIPTION: Mort Bay Jetty 6.1.8 writes backtrace data without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator, related to (1) a string value in the Age parameter to the default URI for the Cookie Dump Servlet in test-jetty-webapp/src/main/java/com/acme/CookieDump.java under cookie/, (2) an alphabetic value in the A parameter to jsp/expr.jsp, or (3) an alphabetic value in the Content-Length HTTP header to an arbitrary application.

CVSS Base Score: 5.1
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/55533 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:H/Au:N/C:P/I:P/A:P)

CVEID: CVE-2009-4610

DESCRIPTION: Multiple cross-site scripting (XSS) vulnerabilities in Mort Bay Jetty 6.1.8 allows remote attackers to inject arbitrary web script or HTML via (1) the query string to jsp/dump.jsp in the JSP Dump feature, or the (2) Name or (3) Value parameter to the default URI for the Session Dump Servlet under session/.

CVSS Base Score: 4.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/55651 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N)

CVEID: CVE-2009-4609

DESCRIPTION:The Dump Servlet in Mort Bay Jetty 6.1.8 allows remote attackers to obtain sensitive information about internal variables and other data via a request to a URI ending in /dump/, as demonstrated by discovering the value of the getPathTranslated variable.

CVSS Base Score: 5.0
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/55650 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:N/C:P/N:P/A:N)

CVEID: CVE-2009-1524

DESCRIPTION: Cross-site scripting (XSS) vulnerability in Mort Bay Jetty in 6.1.8 allows remote attackers to inject arbitrary web script or HTML via a directory listing request containing a ; (semicolon) character.

CVSS Base Score: 4.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/50301 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:N/N:P/A:N)

CVEID: CVE-2009-1523

DESCRIPTION: Directory traversal vulnerability in the HTTP server in Mort Bay Jetty 6.1.8 allows remote attackers to access arbitrary files via directory traversal sequences in the URI.

CVSS Base Score: 4.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/50298 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:P/N:N/A:N)

Affected Products and Versions

IBM Sterling B2B Integrator 5.1 or IBM Sterling File Gateway 2.1
IBM Sterling B2B Integrator 5.2 or IBM Sterling File Gateway 2.2

Remediation/Fixes

Product

VRMFAPARRemediation/First Fix
IBM Sterling B2B Integrator 5.1.x
IC9918
Jetty has been upgraded to version 6.1.26. Apply Generic Interim Fix 5104_3. Available on IWM
IBM Sterling File Gateway2.1.xJetty has been upgraded to version 6.1.26. Apply Generic Interim Fix 5104_3. Available on IWM
IBM Sterling B2B Integrator5.2.4.2Jetty has been upgraded to version 6.1.26. Apply Generic Interim Fix 5020402_2. Available on Fix Central
IBM Sterling File Gateway
2.2.4.2Jetty has been upgraded to version 6.1.26. Apply Generic Interim Fix 5020402_2. Available on Fix Central
IBM Sterling B2B Integrator5.2.xJetty has been upgraded to version 6.1.26. Apply 5020500 Fix Pack or Media available on Fix Central and Passport Advantage respectively
IBM Sterling File Gateway
2.2.xJetty has been upgraded to version 6.1.26. Apply 5020500 Fix Pack or Media available on Fix Central and Passport Advantage respectively

To acquire the fix please login to IWM
See FAQs on downloading an iFix from the IWM site

To acquire the fix please login to IBM Fix Central.
More details and release notes can be found here:
IBM Sterling B2B Integrator 5.2 Information Center

To acquire the fix from Passport Advantage, please login here.

Workarounds and Mitigations

None Known.

Get Notified about Future Security Bulletins

References

Off

Change History

March 12, 2014: Initial Version
December 12, 2014: Updated remediation/fixes with 5020500 as of the fixes:

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer

Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.

[{"Product":{"code":"SS3JSW","label":"IBM Sterling B2B Integrator"},"Business Unit":{"code":"BU059","label":"IBM Software w\/o TPS"},"Component":"--","Platform":[{"code":"PF025","label":"Platform Independent"}],"Version":"5.2;5.1","Edition":"","Line of Business":{"code":"LOB59","label":"Sustainability Software"}}]

Document Information

Modified date:
11 February 2020

UID

swg21666525