IBM Support

Security Bulletin: Multiple IBM InfoSphere Information Server components are vulnerable due to ClassLoader manipulation vulnerability in Open Source Apache Struts version 1 (CVE-2014-0114)

Security Bulletin


Summary

Apache Struts could allow a remote attacker to execute arbitrary code on the system, caused by the failure to restrict the setting of Class Loader attributes. An attacker could exploit this vulnerability using the class parameter of an ActionForm object to manipulate the ClassLoader and execute arbitrary code on the system. IBM Information Server and constituent products are impacted.

Vulnerability Details

CVE ID: CVE-2014-0114

CVSS:
CVSS Base Score: 7.5
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/92889 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:N/C:P/I:P/A:P)

Affected Products and Versions

IBM InfoSphere Information Server versions 8.0, 8.1, 8.5, 8.7, and 9.1,
IBM InfoSphere Information Server Information Services Director versions 8.0, 8.1, 8.5, 8.7, and 9.1,
IBM InfoSphere Information Server Business Glossary versions 8.0, 8.1 and 8.5,
IBM InfoSphere Information Server Metadata Workbench versions 8.0, 8.1, 8.5, 8.7, and 9.1,
each running on all platforms.
Also, IBM InfoSphere Data Click version 10.0 running on Linux

Remediation/Fixes

Product

VRMFAPARRemediation/First Fix
InfoSphere Data Click10.0JR50236Contact IBM customer support to obtain the fix.
InfoSphere Information Server and components9.1JR50236 JR50276
JR50202
--Apply IBM InfoSphere Information Server version 9.1.2.0
--Apply IBM InfoSphere Information Server Information Services Framework (ISF) 9.1.2 Rollup Patch 2
--Apply the IBM InfoSphere Information Server Metadata Workbench Security Patch
--Follow instructions in the IBM InfoSphere Information Server Information Services Director TechNote
InfoSphere Information Server and components8.7JR50236 JR50276
JR50202
--Apply IBM InfoSphere Information Server version 8.7 Fix Pack 2
--Apply the IBM InfoSphere Information Server Information Services Framework (ISF) Security Patch
--Apply the IBM InfoSphere Information Server Metadata Workbench Security Patch
--Follow instructions in the IBM InfoSphere Information Server Information Services Director TechNote
InfoSphere Information Server and components8.5JR50236 JR50276
JR50202
--Apply IBM InfoSphere Information Server version 8.5 Fix Pack 3
--Apply IBM InfoSphere Information Server Information Services Framework (ISF) 8.5 Rollup Patch 2
--Apply the IBM InfoSphere Information Server Metadata Workbench Security Patch
--Apply the IBM InfoSphere Information Server Business Glossary Security Patch
--Follow instructions in the IBM InfoSphere Information Server Information Services Director TechNote
InfoSphere Information Server and components8.1JR50236 JR50276
JR50202
--Apply IBM InfoSphere Information Server version 8.1 Fix Pack 2
--Follow instructions in the IBM InfoSphere Information Server Information Services Director TechNote
--Apply the IBM InfoSphere Information Server Information Services Framework (ISF) Security Patch
If you need the fix for Metadata Workbench or Business Glossary:
--Apply IBM InfoSphere Foundation Tools version 8.1.2 (available on Passport Advantage). Information available here.
--Apply IBM InfoSphere Information Server version 8.1.2 Fix Pack 5
--Apply the IBM InfoSphere Information Server Metadata Workbench Security Patch
--Apply the IBM InfoSphere Information Server Business Glossary Security Patch
InfoSphere Information Server and components8.0NoneContact IBM customer support.


Note: The same fix may be listed under multiple vulnerabilities. Installing the fix addresses all vulnerabilities to which the fix applies. Also, some fixes require installing both a fix pack and a subsequent patch. While the fix pack must be installed first, any additional patches required may be installed in any order.

Workarounds and Mitigations

None known, apply fixes

Get Notified about Future Security Bulletins

References

Off

Change History

10 Jun 2014: Original version published
19 Jun 2014: Added release information for 8.7 and 8.5
10 July 2014: Updated for InfoSphere Data Click version 10.0
18 July 2014: Added release information for 8.1
23 July 2014: Updated Remediation information for 9.1 and 8.5

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

[{"Product":{"code":"SSZJPZ","label":"InfoSphere Information Server"},"Business Unit":{"code":"BU050","label":"BU NOT IDENTIFIED"},"Component":"--","Platform":[{"code":"PF002","label":"AIX"},{"code":"PF010","label":"HP-UX"},{"code":"PF016","label":"Linux"},{"code":"PF027","label":"Solaris"},{"code":"PF033","label":"Windows"}],"Version":"9.1;8.7;8.5;8.1;8.0;10.0","Edition":""},{"Product":{"code":"SSZJPZ","label":"InfoSphere Information Server"},"Business Unit":{"code":"BU050","label":"BU NOT IDENTIFIED"},"Component":" ","Platform":[{"code":"PF002","label":"AIX"},{"code":"PF010","label":"HP-UX"},{"code":"PF016","label":"Linux"},{"code":"PF027","label":"Solaris"},{"code":"PF033","label":"Windows"}],"Version":"9.1.2.0;8.7.0.2;8.5.0.3;8.1;8.0;10.0","Edition":""}]

Document Information

Modified date:
16 June 2018

UID

swg21674812