IBM Support

Security Bulletin: A vulnerability exists in the Event Streams 10.0.0 schema registry that allows unauthorised access to create, edit and delete schemas (CVE-2020-4662)

Security Bulletin


Summary

A vulnerability exists in the Event Streams 10.0.0 schema registry that allows unauthorised access to create, edit and delete schemas

Vulnerability Details

CVEID:   CVE-2020-4662
DESCRIPTION:   IBM Event Streams could allow an authenticated user to perform tasks to a schema due to improper authentication validation.
CVSS Base score: 6.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/186233 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N)

Affected Products and Versions

 

Affected Product(s)Version(s)
 IBM Event Streams10.0.0

 

Remediation/Fixes

To fix this issue you will need to have access to the following image in the ibm entitled registry

cp.icr.io/cp/ibm-eventstreams-schema-proxy@sha256:7ff23bc286cc4b1557287a8e48af1716150e88b0d2c5eeb0c9faf538ba2806e8

If you have an air gapped install you will need to pull down this image into your private image repository and make a note of the location.

  1. Modify the ClusterServiceVersion (csv) of the eventstreams operator.
  2. Get the name of the eventstreams csv, run oc get csv -n <NAMESPACE>, substituting <NAMESPACE> for where you have deployed IBM Event Streams. You should get an entry named ibm-eventstreams.v2.0.0 or ibm-eventstreams.v2.0.1
  3. Edit the csv and find the following environment variable EVENTSTREAMS_DEFAULT_SCHEMA_REGISTRY_PROXY_IMAGE.
  4. Replace the image tag associated with this env var with either the image mentioned above or the one you've pulled into your local private registry.
  5. Save the csv. This will restart the operator with the updated env var and then update the Schema Registry with the required fix

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

References

Off

Acknowledgement

Change History

11 Aug 2020: Initial Publication

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

Document Location

Worldwide

[{"Business Unit":{"code":"BU004","label":"Hybrid Cloud"},"Product":{"code":"SSCL47","label":"Event Streams"},"Component":"","Platform":[{"code":"PF016","label":"Linux"}],"Version":"10.0.0","Edition":"","Line of Business":{"code":"","label":""}}]

Document Information

Modified date:
13 August 2020

UID

ibm16259393