Security Bulletin
Summary
Security vulnerabilities have been reported for IBM SDK for Node.js. IBM Business Automation Workflow and IBM BPM include a stand-alone tool for editing configuration properties files that is based on IBM SDK for Node.js.
Vulnerability Details
CVEID: CVE-2021-44531
DESCRIPTION: Node.js could allow a remote attacker to bypass security restrictions, caused by the improper handling of URI Subject Alternative Name (SAN) types. An attacker could exploit this vulnerability to bypass name-constrained intermediates.
CVSS Base score: 5.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/216930 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
CVEID: CVE-2021-44532
DESCRIPTION: Node.js could allow a remote attacker to bypass security restrictions, caused by a string injection vulnerability when name constraints were used within a certificate chain. An attacker could exploit this vulnerability to bypass the name constraints.
CVSS Base score: 5.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/216931 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
CVEID: CVE-2022-21824
DESCRIPTION: Node.js could provide weaker than expected security, caused by an error related to the formatting logic of the console.table() function. An attacker could exploit this vulnerability using console.table properties to allow an empty string to be assigned to numerical keys of the object prototype.
CVSS Base score: 5.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/216933 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
CVEID: CVE-2022-0778
DESCRIPTION: OpenSSL is vulnerable to a denial of service, caused by a flaw in the BN_mod_sqrt() function when parsing certificates. By using a specially-crafted certificate with invalid explicit curve parameters, a remote attacker could exploit this vulnerability to cause an infinite loop, and results in a denial of service condition.
CVSS Base score: 7.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/221911 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
CVEID: CVE-2021-44533
DESCRIPTION: Node.js could allow a remote attacker to bypass security restrictions, caused by the incorrect handling of multi-value Relative Distinguished Names. By crafting certificate subjects containing a single-value Relative Distinguished Name that would be interpreted as a multi-value Relative Distinguished Name, an attacker could exploit this vulnerability to bypass the certificate subject verification.
CVSS Base score: 5.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/216932 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
Affected Products and Versions
| Affected Product(s) | Version(s) | Status |
|---|---|---|
| IBM Business Automation Workflow traditional | V21.0.1 - V21.0.3 V20.0.0.1 - V20.0.0.2 V19.0.0.1 - V19.0.0.3 V18.0.0.0 - V18.0.0.1 | affected |
| IBM Business Automation Workflow containers | V21.0.1 - V21.0.3 V20.0.0.1 - V20.0.0.2 | not affected |
| IBM Business Process Manager | V8.6.0.0 - V8.6.0.201803 | affected |
| IBM Business Process Manager | V8.5.0.0 - V8.5.0.201706 | not affected |
Remediation/Fixes
The recommended solution is to apply the Interim Fix (iFix) or Cumulative Fix (CF) containing APAR JR64535 as soon as practical:
| Affected Product(s) | Version(s) | Remediation / Fix |
|---|---|---|
| IBM Business Automation Workflow traditional | V21.0.3 | Apply JR64535 |
| IBM Business Automation Workflow traditional | V21.0.2 | Apply JR64535 or upgrade to IBM Business Automation Workflow 21.0.3 |
| IBM Business Automation Workflow traditional | V20.0.0.2 | Apply JR64535 or upgrade to IBM Business Automation Workflow 21.0.3 |
| IBM Business Automation Workflow traditional | V20.0.0.1 | Upgrade to IBM Business Automation Workflow v20.0.0.2 and apply JR64535 or upgrade to IBM Business Automation Workflow 21.0.3 |
| IBM Business Automation Workflow traditional | V19.0.0.3 | Apply JR64535 or upgrade to IBM Business Automation Workflow 21.0.3 |
| IBM Business Automation Workflow traditional | V19.0.0.2 V19.0.0.1 V18.0.0.2 V18.0.0.1 | Upgrade to IBM Business Automation Workflow 19.0.0.3 and apply JR64535 or upgrade to IBM Business Automation Workflow 21.0.3 |
| IBM Business Automation Workflow traditional | V18.0.0.0 | Apply JR64535 or upgrade to IBM Business Automation Workflow 21.0.3 |
| IBM Business Process Manager | V8.6.0.0 - V8.6.0.201803 | Upgrade to IBM Business Process Manager Version 8.6 Cumulative Fix 2018.03 and apply JR64535 or upgrade to IBM Business Automation Workflow 21.0.3 |
Workarounds and Mitigations
Get Notified about Future Security Bulletins
References
Change History
09 May 2022: Initial Publication
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
Disclaimer
Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.
Document Location
Worldwide
Was this topic helpful?
Document Information
Modified date:
09 May 2022
Initial Publish date:
09 May 2022
UID
ibm16584089