Security Bulletin
Summary
IBM Netezza for Cloud Pak for Data is vulnerable to injection attack due to improper input validation by the urllib.parse module from Python3. Vulnerability is addressed by upgrading Pytthon to version 3.9.7.
Vulnerability Details
CVEID: CVE-2022-0391
DESCRIPTION: Python could provide weaker than expected security, cause by a improper input validation by the urllib.parse module. By sending a specially-crafted request using \r and \n characters in the URL path. An attacker could exploit this vulnerability to perform injection attack or launch further attacks on the system.
CVSS Base score: 5.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/219613 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
Affected Products and Versions
| Affected Product(s) | Version(s) |
| IBM Netezza for Cloud Pak for Data | 11.2.1.0 - 11.2.1.5 |
Remediation/Fixes
IBM strongly recommends addressing the vulnerability now for affected versions listed by applying the fix.
| Product | Version | Remediation/Fix/Instructions |
| IBM Netezza for Cloud Pak for Data | 11.2.1.6 | Link to Fix Central |
Workarounds and Mitigations
None
Get Notified about Future Security Bulletins
References
Change History
09 Aug 2022: Initial Publication
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
Disclaimer
Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.
Document Location
Worldwide
Was this topic helpful?
Document Information
Modified date:
09 August 2022
Initial Publish date:
09 August 2022
UID
ibm16611149