IBM Support

Security Bulletin: Vulnerability exists for Spring Framework in Watson Explorer (CVE-2021-22060, CVE-2022-22965, CVE-2022-22950)

Security Bulletin


Summary

Security vulnerability in Spring Framework affects IBM Watson Explorer. IBM Watson Explorer has addressed this vulnerability.

Vulnerability Details

CVEID:   CVE-2021-22060
DESCRIPTION:   VMware Tanzu Spring Framework could allow a remote authenticated attacker to bypass security restrictions, caused by improper input validation. By sending a specially-crafted request, an attacker could exploit this vulnerability to insert additional log entries.
CVSS Base score: 4.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/217183 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N)

CVEID:   CVE-2022-22965
DESCRIPTION:   Spring Framework could allow a remote attacker to execute arbitrary code on the system, caused by the improper handling of PropertyDescriptor objects used with data binding. By sending specially-crafted data to a Spring Java application, an attacker could exploit this vulnerability to execute arbitrary code on the system. Note: The exploit requires Spring Framework to be run on Tomcat as a WAR deployment with JDK 9 or higher using spring-webmvc or spring-webflux. Note: This vulnerability is also known as Spring4Shell or SpringShell.
CVSS Base score: 9.8
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/223103 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

CVEID:   CVE-2022-22950
DESCRIPTION:   VMware Tanzu Spring Framework is vulnerable to a denial of service, caused by improper input validation. By sending a specially-crafted crafted SpEL expression, a remote attacker could exploit this vulnerability to cause a denial of service condition.
CVSS Base score: 5.4
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/223096 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L)

Affected Products and Versions

Affected Product(s)Version(s)
IBM Watson Explorer Deep Analytics Edition Foundational Components
12.0.0.0,
12.0.1,
12.0.2.0 - 12.0.2.2,
12.0.3.0 - 12.0.3.9
IBM Watson Explorer Deep Analytics Edition Analytical Components
12.0.0.0,
12.0.1,
12.0.2.0 - 12.0.2.2,
12.0.3.0 - 12.0.3.9
IBM Watson Explorer Foundational Components11.0.0.0 - 11.0.0.3,
11.0.1,
11.0.2.0 - 11.0.2.13
IBM Watson Explorer Analytical Components11.0.0.0 - 11.0.0.3,
11.0.1,
11.0.2.0 - 11.0.2.13

Remediation/Fixes

Affected ProductAffected VersionsHow to acquire and apply the fix
IBM Watson Explorer Deep Analytics Edition
Foundational Components
12.0.0.0,
12.0.1,
12.0.2.0 - 12.0.2.2, 12.0.3.0 - 12.0.3.9

Query Modifier service is affected by this vulnerability. If Query Modifier service is installed (see Installing Query Modifier), please follow the steps below.

  1. If you have not already installed, install V12.0.3.9 (see the Fix Pack download document).
  2. Download the interim fix from Fix Central12.0.3.9-WS-WatsonExplorer-DAEFoundational-IF001.
  3. To apply the fix, follow the steps below.
    1. Stop Query Modifier service if it is running
      • Linux: Run /etc/init.d/querymodifier stop
      • Windows: Open the Service window, choose the Query Modifier Service, and click the Stop Service button.
    2. Navigate to <install_dir>/Engine/nlq
    3. Rename querymodifier.jar to querymodifier.jar.bak
    4. Copy the downloaded querymodifier.jar to <install_dir>/Engine/nlq
    5. Run install command
      • Linux: querymodifier-install.sh
      • Windows: querymodifier-install.ps1
    6. Start Query Modifier service if you use the service
      • Linux: Run /etc/init.d/querymodifier start
      • Windows: Open the Service window, choose the Query Modifier Service, and click the Start Service button.
IBM Watson Explorer Deep Analytics Edition Analytical Components12.0.0.0, 12.0.1, 12.0.2.0 - 12.0.2.2, 12.0.3.0 - 12.0.3.9

Natural Language Query service is affected by this vulnerability. Please follow the steps below.

  1. If you have not already installed, install V12.0.3.9 (see the Fix Pack download document).
  2. Download the interim fix from Fix Central12.0.3.9-WS-WatsonExplorer-DAEAnalytical-IF001.
  3. To apply the fix, follow the steps below.
    1. Stop all services if it is running
          esadmin stop
    2. Navigate to <install_dir>/lib
    3. Rename querymodifier.jar and es.indexservice.jar to querymodifier.jar.bak and es.indexservice.jar.bak
    4. Copy the downloaded querymodifier.jar and es.indexservice.jar to <install_dir>/lib
    5. Start all services
          esadmin start
IBM Watson Explorer
Foundational Components
11.0.0.0 - 11.0.0.3,
11.0.1,
11.0.2.0 -
11.0.2.13

Query Modifier service is affected by this vulnerability. If Query Modifier service is installed (see Installing Query Modifier), please follow the steps below.

  1. If you have not already installed, install V11.0.2.13 (see the Fix Pack download document).
  2. Download the interim fix for your edition (Enterprise or Advanced) from Fix Central11.0.2.13-WS-WatsonExplorer-<Edition>Foundational-IF001 (EE for Enterprise Edition, AE for Advanced Edition).
  3. To apply the fix, follow the steps below.
    1. Stop Query Modifier service if it is running
      • Linux: Run /etc/init.d/querymodifier stop
      • Windows: Open the Service window, choose the Query Modifier Service, and click the Stop Service button.
    2. Navigate to <install_dir>/Engine/nlq
    3. Rename querymodifier.jar to querymodifier.jar.bak
    4. Copy the downloaded querymodifier.jar to <install_dir>/Engine/nlq
    5. Run install command
      • Linux: querymodifier-install.sh
      • Windows: querymodifier-install.ps1
    6. Start Query Modifier service if you use the service
      • Linux: Run /etc/init.d/querymodifier start
      • Windows: Open the Service window, choose the Query Modifier Service, and click the Start Service button.
IBM Watson Explorer Analytical Components11.0.0.0 - 11.0.0.3,
11.0.1,
11.0.2.0 - 
11.0.2.13

Natural Language Query service is affected by this vulnerability. Please follow the steps below.

  1. If you have not already installed, install V11.0.2.13 (see the Fix Pack download document).
  2. Download the interim fix from Fix Central11.0.2.13-WS-WatsonExplorer-AEAnalytical-IF001.
  3. To apply the fix, follow the steps below.
    1. Stop all services if it is running
          esadmin stop
    2. Navigate to <install_dir>/lib
    3. Rename querymodifier.jar and es.indexservice.jar to querymodifier.jar.bak and es.indexservice.jar.bak
    4. Copy the downloaded querymodifier.jar and es.indexservice.jar to <install_dir>/lib
    5. Start all services
          esadmin start

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

References

Off

Acknowledgement

Change History

22 Apr 2022: Initial Publication

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer

Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.

Document Location

Worldwide

[{"Business Unit":{"code":"BU059","label":"IBM Software w\/o TPS"},"Product":{"code":"SS8NLW","label":"Watson Explorer"},"Component":"","Platform":[{"code":"PF002","label":"AIX"},{"code":"PF016","label":"Linux"},{"code":"PF033","label":"Windows"}],"Version":"11.0.0, 11.0.1, 11.0.2, 12.0.0, 12.0.1, 12.0.2, 12.0.3","Edition":"","Line of Business":{"code":"LOB10","label":"Data and AI"}}]

Document Information

Modified date:
22 April 2022

UID

ibm16573715