Security Bulletin
Summary
An Apache Commons Compress vulnerability has been identified with the embeded IBM FileNet P8 Content Platform Engine component, specifically with the Administration Console for Content Platform Engine application, in IBM Business Process Manager and IBM Business Automation Workflow.
Vulnerability Details
CVEID: CVE-2019-12402
DESCRIPTION: The file name encoding algorithm used internally in Apache Commons Compress 1.15 to 1.18 can get into an infinite loop when faced with specially crafted inputs. This can lead to a denial of service attack if an attacker can choose the file names inside of an archive created by Compress.
CVSS Base score: 5.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/165956 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
Affected Products and Versions
| Affected Product(s) | Version(s) |
| IBM Business Process Manager | 8.5.7 |
| IBM Business Automation Workflow | 18.0.0.0 |
| IBM Business Automation Workflow | 18.0.0.1 |
Note: CVE 2019-12402, which is specifically for an IBM Administration Console for Content Platform Engine that is part of the embedded Content Platform Engine, does not affect Business Automation Workflow V18.0.0.2 or later versions.
Remediation/Fixes
The recommended solution is to apply the Interim Fix (iFix) or Cumulative Fix (CF) containing APAR JR61648 as soon as practical:
- IBM Business Automation Workflow (including fix for IBM Business Process Manager V8.6.0.0 2018.03)
- IBM Business Process Manager Advanced
- IBM Business Process Manager Standard
- IBM Business Process Manager Express
For IBM Business Automation Workflow V18.0.0.1
· Upgrade to minimal cumulative fix levels as required by iFix and then apply iFix JR61648
--OR--
· Apply cumulative fix Business Automation Workflow V19.0.0.3
For IBM Business Process Manager V8.6.0.0 through V8.6.0.0 CF 2018.03
· Upgrade to minimal cumulative fix levels as required by iFix and then apply iFix JR61648
--OR--
· Upgrade to Business Automation Workflow V19.0.0.3
Workarounds and Mitigations
None
Get Notified about Future Security Bulletins
References
Change History
27 Jan 2020: Initial Publication
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
Disclaimer
Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.
Document Location
Worldwide
Was this topic helpful?
Document Information
Modified date:
14 September 2022
UID
ibm11283920