IBM Cloud Orchestrator and IBM Cloud Orchestrator Enterprise has identified and addressed the vulnerability because of unencrypted sensitive data.
DESCRIPTION: IBM Cloud Orchestrator stores sensitive information in URL parameters. This may lead to information disclosure if unauthorized parties have access to the URLs via server logs, referrer header or browser history.
CVSS Base Score: 5.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/162239 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N)
Affected Products and Versions
IBM Cloud Orchestrator and IBM Cloud Orchestrator Enterprise 2.5, 220.127.116.11, 18.104.22.168, 22.214.171.124, 126.96.36.199, 188.8.131.52, 184.108.40.206, 220.127.116.11, 18.104.22.168, 22.214.171.124
IBM Cloud Orchestrator and IBM Cloud Orchestrator Enterprise 2.4, 126.96.36.199, 188.8.131.52, 184.108.40.206, 220.127.116.11, 18.104.22.168
The recommended solution is to apply the fixes as soon as practical.
|Principal Product and Version(s)||VRMF||Remediation/First Fix|
|IBM Cloud Orchestrator and IBM Cloud Orchestrator Enterprise||2.5, 22.214.171.124, 126.96.36.199, 188.8.131.52, 184.108.40.206, 220.127.116.11, 18.104.22.168, 22.214.171.124, 126.96.36.199, 188.8.131.52||
For 2.5 versions, IBM recommends upgrading to Fix Pack 10 (184.108.40.206) of IBM Cloud Orchestrator:
|IBM Cloud Orchestrator and IBM Cloud Orchestrator Enterprise||2.4, 220.127.116.11, 18.104.22.168, 22.214.171.124, 126.96.36.199, 188.8.131.52||
Contact IBM Cloud Orchestrator support.
Workarounds and Mitigations
Get Notified about Future Security Bulletins
23 October 2019: Original version published
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.
Internal Use Only
Was this topic helpful?
23 October 2019