Security Bulletin
Summary
You cannot restrict file uploads by MIME type in a document list coach view. As a result, potentially malicious files, such as HTML that contains embedded JavaScript can be uploaded and run in the browser.
Vulnerability Details
CVE ID: CVE-2014-3075
DESCRIPTION:
IBM BPM document management feature might allow a remote attacker to include arbitrary files. A remote attacker might upload a file from a remote system, which might be viewed in an iframe by other end users.
CVSS Base Score: 4.0
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/93817 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:S/C:N/I:P/A:N)
Affected Products and Versions
- IBM Business Process Manager Standard V7.5.x, 8.0.x, and 8.5.x
- IBM Business Process Manager Express V7.5.x, 8.0.x, and 8.5.x
- IBM Business Process Manager Advanced V7.5.x, 8.0.x, and 8.5.x
- IBM WebSphere Lombardi Edition V7.2.0.x
Remediation/Fixes
Install IBM Business Process Manager interim fix JR50092 as appropriate for your current IBM Business Process Manager or WebSphere Lombardi Edition version.
- IBM Business Process Manager Express
- IBM Business Process Manager Standard
- IBM Business Process Manager Advanced
- IBM WebSphere Lombardi Edition
If you are using earlier unsupported versions, IBM strongly recommends that you upgrade to a supported version.
The fix introduces additional functionality to the product with two server-side configuration options. One option is for file uploads and other option is for file downloads.
- A server-side configuration option is introduced, which allows you to specify an optional white-list of MIME types. MIME types that are included in the list are allowed for uploads, but all other MIME types are blocked from uploads.
- A server-side configuration option is introduced, which allows you to specify an optional black-list of MIME type mappings. Each MIME type mapping allows for a conversion to be made from a specific MIME type to a specific MIME type upon download.
The following example is a sample configuration of new options, which you can configure in the 100Custom.xml file:
<server>
<!-- mime type allowlist which specifies mime types accepted for -->
<!-- upload to document list or document attachment -->
<document-attachment-accepted-mime-types>
<!-- specifies whether to allow a null mime type for upload -->
<allow-null-mime-type>false</allow-null-mime-type>
<!-- lists the mime types allowed for upload -->
<mime-type>text/plain</mime-type>
<mime-type>img/png</mime-type>
</document-attachment-accepted-mime-types>
<!-- mime type blocklist which specifies mappings from unacceptable -->
<!-- mime types to acceptable mime types for download from -->
<!-- document list or document attachment -->
<document-attachment-download-mime-types>
<!-- will map text/html mime type to text/plain mime type -->
<mime-type-map>
<from>text/html</from>
<to>text/plain</to>
</mime-type-map>
<!-- missing <to> element implies mapping to content/octet-stream -->
<mime-type-map>
<from>application/pdf</from>
</mime-type-map>
</document-attachment-download-mime-types>
</server>
Note: The default configuration, which does not include the configuration information that is provided in the 100Custom.xml file, acts as a blocklist for the text/html MIME type and maps it to the text/plain MIME type. Providing a configuration in the 100Custom.xml file overrides the default configuration. As a result, for text/html to remain on the blocklist, it should be explicitly added to the 100Custom.xml file.
Workarounds and Mitigations
None
Get Notified about Future Security Bulletins
Important Note
IBM strongly suggests that all System z customers be subscribed to the System z Security Portal to receive the latest critical System z security and integrity service. If you are not subscribed, see the instructions on the System z Security web site. Security and integrity APARs and associated fixes will be posted to this portal. IBM suggests reviewing the CVSS scores and applying all security or integrity fixes as soon as possible to minimize any potential risk.
References
Change History
2014-08-29 - initally published
2014-11-03 - updated summary and CVSS information (loweing CVSS from 6.5 to 4.0)
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
Disclaimer
Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.
Product Synonym
BPM
Was this topic helpful?
Document Information
Modified date:
15 June 2018
UID
swg21679979