IBM DataPower Gateway is vulnerable to a cross-site request forgery attack against the Web UI. IBM has addressed the vulnerability.
DESCRIPTION: IBM DataPower Gateway is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts.
CVSS Base score: 8.8
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/228357 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)
Affected Products and Versions
|IBM DataPower Gateway V10CD||V10.0.2.0 - 10.0.4.0|
|IBM DataPower Gateway 10.0.1||10.0.1.0 - 10.0.1.9|
|IBM DataPower Gateway 2018.4.1||2018.4.1.0 - 2018.4.1.22|
|Affected Product||Fixed in version||Fix link|
|IBM DataPower Gateway V10CD||10.0.4.0sr2||IT42300|
|IBM DataPower Gateway 10.0.1||10.0.1.10||IT42300|
|IBM DataPower Gateway 2018.4.1||2018.4.1.23||IT42300|
The fix is also available in version 10.5.0; customers using earlier releases may upgrade free of charge to 10.5.0.
Workarounds and Mitigations
Customers should ensure that management interfaces are accessible only via internal networks. Administrators should not click on links from untrusted sources, and should log out when not actually performing administrative tasks.
Get Notified about Future Security Bulletins
The vulnerability was reported to IBM by Maxence SCHMITT (Michelin CERT) & Maxime ESCOURBIAC (Michelin CERT).
18 Aug 2022: Initial Publication
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.
Was this topic helpful?
18 November 2022