IBM Support

Security Bulletin: Steps to update DataQuant Wrokstation ans DataQuant WebSphere plugins.

Security Bulletin


Summary

Query is vulnerable to cross-site scripting, caused by improper validation of user-supplied input by the HTML() function. A remote attacker could exploit this vulnerability to execute script in a victim's Web browser within the security context of the hosting Web site. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials.

Vulnerability Details

CVEID:   CVE-2020-11023
DESCRIPTION:   jQuery is vulnerable to cross-site scripting, caused by improper validation of user-supplied input by the option elements. A remote attacker could exploit this vulnerability to inject malicious script into a Web page which would be executed in a victim's Web browser within the security context of the hosting Web site, once the page is viewed. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials.
CVSS Base score: 6.1
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/181350 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)

CVEID:   CVE-2020-11022
DESCRIPTION:   jQuery is vulnerable to cross-site scripting, caused by improper validation of user-supplied input by the jQuery.htmlPrefilter method. A remote attacker could exploit this vulnerability to inject malicious script into a Web page which would be executed in a victim's Web browser within the security context of the hosting Web site, once the page is viewed. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials.
CVSS Base score: 6.1
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/181349 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)

Affected Products and Versions

Affected Product(s)Version(s)
DataQuant for z/OS2.1
DataQuant for Multiplatforms2.1

Remediation/Fixes

Please see "Workarounds."

Workarounds and Mitigations

Steps for DataQuant Workstation:

  1. Close DataQuant.
  2. Navigate to the plugins directory present within DataQuant install directory.

Example: <DATAQUANT_HOME>/DataQuant For Workstation/plugins

  1. Locate the folder - com.ibm.bi.reporter_2.1.7.20170216 in the above Directory. Take a backup & remove the directory along with contents from this location.
  2. Download the attached zip file & extract it to a temporary location.
  3. Place the extracted folder in the directory <DATAQUANT_HOME>/DataQuant For Workstation/plugins.
  4. Once replaced, launch DataQuant.

 

Steps for DataQuant WebSphere:

  1. On a deployed product instance, stop the DataQuant WebSphere application.
  2. Locate the plugin folder - com.ibm.bi.reporter_2.1.7.20170216. Take a backup and remove it from the plugins directory.

Standard location → <IBM_WebSphere>\AppServer\profiles\AppSrv01\installedApps\ams-vm-qmf11Node01Cell\DataQuant for WebSphere 2.1.ear\DataQuantWebSphere21.war\WEB-INF\eclipse\plugins\

  1. Download the attached zip file & extract it to a temporary location.
  2. Place the extracted folder in the directory  → <IBM_WebSphere>\AppServer\profiles\AppSrv01\installedApps\MyMachineNode01Cell\DataQuant for WebSphere 2.1.ear\DataQuantWebSphere21.war\WEB-INF\eclipse\plugins\
  3. Optionally, to copy files for WebSphere application server on windows using XCOPY command run step 6
  4. Open command prompt with 'Run As Administrator' option  and use the XCOPY command

For Example → Xcopy /E /I "<UserLocationForDownloadedZip>\com.ibm.bi.reporter_2.1.8.20200927" "<IBM_WebSphere>\AppServer\profiles\AppSrv01\installedApps\MyMachineNode01Cell\DataQuant for WebSphere 2.1.ear\DataQuantWebSphere21.war\WEB-INF\eclipse\plugins\com.ibm.bi.reporter_2.1.8.20200927"

  1. Start the DataQuant application within WebSphere.

Get Notified about Future Security Bulletins

References

Off

Change History

07 Oct 2020: Initial Publication

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer

Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.

Document Location

Worldwide

[{"Business Unit":{"code":"BU053","label":"Cloud & Data Platform"},"Product":{"code":"SSAUQR","label":"IBM DataQuant for z\/OS"},"Component":"","Platform":[{"code":"PF033","label":"Windows"}],"Version":"2.1","Edition":"","Line of Business":{"code":"LOB10","label":"Data and AI"}}]

Document Information

Modified date:
07 October 2020

Initial Publish date:
07 October 2020

UID

ibm16344085