Security Bulletin
Summary
IBM Cloud Pak for Applications 4.3 nodejs and nodejs-express Appsody stacks is vulnerable to information disclosure, buffer overflow and prototype pollution exposures (CVE-2020-15095, CVE-2020-8116, CVE-2020-8201 and CVE-2020-8252).
Vulnerability Details
CVEID: CVE-2020-15095
DESCRIPTION: Node.js npm CLI module could allow a local attacker to obtain sensitive information, caused by the storing of user credentials in the log file. By persuading a victim to open a log file, an attacker could exploit this vulnerability to obtain user credentials.
CVSS Base score: 4.7
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/184666 for the current score.
CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N)
CVEID: CVE-2020-8116
DESCRIPTION: Node.js dot-prop could allow a remote attacker to execute arbitrary code on the system, caused by a prototype pollution. By sending a specially crafted request, an attacker could exploit this vulnerability to execute arbitrary code on the system or cause a denial of service.
CVSS Base score: 9.8
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/175850 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
CVEID: CVE-2020-8201
DESCRIPTION: Node.js is vulnerable to HTTP request smuggling, caused by CR-to-Hyphen conversion. By sending specially crafted HTTP request headers, an attacker could exploit this vulnerability to poison the web cache, bypass web application firewall protection, and conduct XSS attacks.
CVSS Base score: 7.4
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/188591 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N)
CVEID: CVE-2020-8252
DESCRIPTION: Node.js is vulnerable to a buffer overflow, caused by improper bounds checking by the libuv's fs.realpath.native. By sending an overly long argument, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause a denial of service.
CVSS Base score: 7.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/188593 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Affected Products and Versions
| Affected Product(s) | Version(s) |
| IBM Cloud Pak for Applications | 4.3 |
Remediation/Fixes
To remove the security vulnerability exposure, use the new nodejs and nodejs-express stacks in IBM Cloud Pak for Applications, change the stack hub repository for your kabanero resource. For example, "oc edit kabanero kabanero" and change the url for the repsitory:
apiVersion: kabanero.io/v1alpha2
kind: Kabanero
metadata:
name: kabanero
namespace: kabanero
spec:
...
repositories:
- gitRelease: {}
https:
url: https://github.com/icp4apps/stack-hub/releases/download/0.22.1/icp4apps-stack-hub-index.yaml
This configuration change will pick up the new nodejs and nodejs-express stacks located at: https://github.com/kabanero-io/collections/releases/tag/0.10.4
Workarounds and Mitigations
None
Get Notified about Future Security Bulletins
References
Change History
2021-May-20
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
Disclaimer
Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.
Document Location
Worldwide
Was this topic helpful?
Document Information
Modified date:
07 June 2021
UID
ibm16461891