IBM Support

Security Bulletin: IBM Application Navigator, which is bundled with IBM Cloud Pak for Applications, is vulnerable to a remote attacker exploitation of Apache Log4j (CVE-2021-44228)

Security Bulletin


Summary

IBM Application Navigator, which is bundled with IBM Cloud Pak for Applications, is vulnerable to a remote attacker exploitation of Apache Log4j (CVE-2021-44228). The IBM Application Navigator contains a copy of Apache Log4j which is not used by the IBM Application Navigator function. Out of an abundance of caution this update removes the unused copy of Apache Log4j.

Vulnerability Details

CVEID:   CVE-2021-43822
DESCRIPTION:   Jackalope Doctrine-DBAL is vulnerable to SQL injection. A remote authenticated attacker could send specially-crafted SQL statements to a node name or query, which could allow the attacker to view, add, modify or delete information in the back-end database.
CVSS Base score: 8.4
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/215123 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:H)

Affected Products and Versions

Principal Product(s) and Version(s)Affected Product(s) and Version(s)
IBM Cloud Pak for Applications, 4.3IBM Application Navigator, 2.5.0

Remediation/Fixes

Refer to the following security bulletin for vulnerability details and information about fixes addressed by IBM Application Navigator which is shipped with IBM Cloud Pak for Applications.
 
 
 
For IBM Cloud Pak for Applications V4.3.1, Appsody Stacks and Stack Hub components:
The IBM Cloud Pak for Applications v4.3.1  support will end 30 April 2022 and IBM does not recommend new installations. Existing installations should patch the Appsody Stacks and Stack Hub by running the following command:
Refer to the following link for additional recommendations: https://www.ibm.com/docs/en/cloud-paks/cp-applications/4.3?topic=overview-deprecations

 

 

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

References

Off

Change History

15 Dec 2021: Initial Publication

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer

Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.

Document Location

Worldwide

[{"Business Unit":{"code":"BU059","label":"IBM Software w\/o TPS"},"Product":{"code":"SSCSJL","label":"IBM Cloud Pak for Applications"},"Component":"","Platform":[{"code":"PF016","label":"Linux"},{"code":"PF002","label":"AIX"},{"code":"PF010","label":"HP-UX"},{"code":"PF033","label":"Windows"},{"code":"PF017","label":"Mac OS"},{"code":"PF035","label":"z\/OS"},{"code":"PF012","label":"IBM i"}],"Version":"4.3","Edition":"","Line of Business":{"code":"LOB45","label":"Automation"}}]

Document Information

Modified date:
16 December 2021

UID

ibm16527218