IBM Support

Security Bulletin: Multiple vulnerabilities in Python affect IBM i

Security Bulletin


Summary

Python is supported by IBM i. IBM i has addressed the applicable CVEs.

Vulnerability Details

CVEID:   CVE-2019-16935
DESCRIPTION:   The documentation XML-RPC server in Python through 2.7.16, 3.x through 3.6.9, and 3.7.x through 3.7.4 has XSS via the server_title field. This occurs in Lib/DocXMLRPCServer.py in Python 2.x, and in Lib/xmlrpc/server.py in Python 3.x. If set_server_title is called with untrusted input, arbitrary JavaScript can be delivered to clients that visit the http URL for this server.
CVSS Base score: 6.1
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/168612 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)
CVEID:   CVE-2019-10160
DESCRIPTION:   A security regression of CVE-2019-9636 was discovered in python since commit d537ab0ff9767ef024f26246899728f0116b1ec3 affecting versions 2.7, 3.5, 3.6, 3.7 and from v3.8.0a4 through v3.8.0b1, which still allows an attacker to exploit CVE-2019-9636 by abusing the user and password parts of a URL. When an application parses user-supplied URLs to store cookies, authentication credentials, or other kind of information, it is possible for an attacker to provide specially crafted URLs to make the application locate host-related information (e.g. cookies, authentication data) and send them to a different host than where it should, unlike if the URLs had been correctly parsed. The result of an attack may vary based on the application.
CVSS Base score: 7.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/162358 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)
CVEID:   CVE-2019-9948
DESCRIPTION:   urllib in Python 2.x through 2.7.16 supports the local_file: scheme, which makes it easier for remote attackers to bypass protection mechanisms that blacklist file: URIs, as demonstrated by triggering a urllib.urlopen('local_file:///etc/passwd') call.
CVSS Base score: 5.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/158831 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
CVEID:   CVE-2019-9947
DESCRIPTION:   An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the path component of a URL that lacks a ? character) followed by an HTTP header or a Redis command. This is similar to the CVE-2019-9740 query string issue.
CVSS Base score: 6.1
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/158830 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)

Affected Products and Versions

Affected Product(s) Version(s)
IBM i 7.4
IBM i 7.3
IBM i 7.2

Remediation/Fixes

Releases 7.4, 7.3 and 7.2 of IBM i are supported and will be fixed.  The issue can be fixed by installing an rpm update based on Python version.

IBM recommends users stay up to date with all packages. 
Command line instructions:
To update all installed packages
yum upgrade

To only update Python 2 to the latest version
yum upgrade python2

To only update Python 3 to the latest version
yum upgrade python3

ACS GUI instructions:
Open the ACS Package Management GUI using Tools -> Open Source Package Management.
From the Updates Available tab, select the packages to update (multiples can be selected using Ctrl + click).
When all packages have been selected, click the Upgrade button and follow the directions on the terminal.

Updated packages:
python2-2.7.17-0.ibmi7.2.ppc64.rpm
python3-3.6.9-1.ibmi7.2.ppc64.rpm

Note: More recent versions of these packages may be available.

For more information about the packages in rpm format, see http://ibm.biz/ibmi-rpms

Important note: IBM recommends that all users running unsupported versions of affected products upgrade to supported and fixed version of affected products.

Workarounds and Mitigations

Releases 7.4, 7.3 and 7.2 of IBM i are supported and will be fixed.  The issue can be fixed by installing an rpm update based on Python version.

IBM recommends users stay up to date with all packages. 
Command line instructions:
To update all installed packages
yum upgrade

To only update Python 2 to the latest version
yum upgrade python2

To only update Python 3 to the latest version
yum upgrade python3


ACS GUI instructions:
Open the ACS Package Management GUI using Tools -> Open Source Package Management.
From the Updates Available tab, select the packages to update (multiples can be selected using Ctrl + click).
When all packages have been selected, click the Upgrade button and follow the directions on the terminal.

Updated packages:
python2-2.7.17-0.ibmi7.2.ppc64.rpm
python3-3.6.9-1.ibmi7.2.ppc64.rpm

Note: More recent versions of these packages may be available.

For more information about the packages in rpm format, see http://ibm.biz/ibmi-rpms

Important note: IBM recommends that all users running unsupported versions of affected products upgrade to supported and fixed version of affected products.

Get Notified about Future Security Bulletins

References

Off

Change History

04 Nov 2019: Initial Publication

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

Document Location

Worldwide

[{"Business Unit":{"code":"BU009","label":"Systems - Cognitive"},"Product":{"code":"SGYQGH","label":"IBM i"},"Component":"N/A","Platform":[{"code":"PF012","label":"IBM i"}],"Version":"7.4, 7.3, 7.2","Edition":"N/A"},{"Business Unit":{"code":"BU009","label":"Systems - Server"},"Product":{"code":"SS9QQS","label":"IBM i 7.4"},"Component":"N/A","Platform":[{"code":"PF012","label":"IBM i"}],"Version":"7.4","Edition":"N/A"},{"Business Unit":{"code":"BU009","label":"Systems - Server"},"Product":{"code":"SSTS2D","label":"IBM i 7.3"},"Component":"N/A","Platform":[{"code":"PF012","label":"IBM i"}],"Version":"7.3","Edition":"N/A"},{"Business Unit":{"code":"BU009","label":"Systems - Server"},"Product":{"code":"SSC5L9","label":"IBM i 7.2"},"Component":"N/A","Platform":[{"code":"PF012","label":"IBM i"}],"Version":"7.2","Edition":"N/A"}]

Document Information

Modified date:
11 November 2019

UID

ibm11102875