Security Bulletin
Summary
The App Connect Enterprise Certified Container Dashboard is vulnerable to CVE-2019-11324 through its use of CouchDB for storing flow data, where the Operator is installed in a Restricted Network cluster.
Vulnerability Details
CVEID: CVE-2019-11324
DESCRIPTION: urllib3 could allow a remote attacker to bypass security restrictions, caused by mishandling of certificates. By sending a specially-crafted certificate, an attacker could exploit this vulnerability to allow SSL connections.
CVSS Base score: 5.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/159909 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
Affected Products and Versions
| Affected Product(s) | Version(s) |
| App Connect Enterprise Certified Container | 1.0.0 with Operator |
| App Connect Enterprise Certified Container | 1.0.1 with Operator |
| App Connect Enterprise Certified Container | 1.0.2 with Operator |
| App Connect Enterprise Certified Container | 1.0.3 with Operator |
Remediation/Fixes
Upgrade to App Connect Enterprise Certified Container to Operator version 1.0.4 as defined in CASE 1.0.5. This explicitly places a prerequisite on using CouchDB operator 1.2.1, which resolves CVE-2019-11324.
Workarounds and Mitigations
None
Get Notified about Future Security Bulletins
References
Change History
29 Sep 2020: Initial Publication
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
Disclaimer
Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.
Document Location
Worldwide
Was this topic helpful?
Document Information
Modified date:
01 October 2020
UID
ibm16340085