Security Bulletin
Summary
IBM TRIRIGA Application Platform discloses CVE-2020-13956
Vulnerability Details
CVEID: CVE-2020-13956
DESCRIPTION: Apache HttpClient could allow a remote attacker to bypass security restrictions, caused by the improper handling of malformed authority component in request URIs. By passing request URIs to the library as java.net.URI object, an attacker could exploit this vulnerability to pick the wrong target host for request execution.
CVSS Base score: 5.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/189572 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
CVEID: CVE-2012-5783
DESCRIPTION: Apache Commons HttpClient, as used in Amazon Flexible Payments Service (FPS) merchant Java SDK and other products, could allow a remote attacker to conduct spoofing attacks, caused by the failure to verify that the server hostname matches a domain name in the subject's Common Name (CN) field of the X.509 certificate. By persuading a victim to visit a Web site containing a specially-crafted certificate, an attacker could exploit this vulnerability using man-in-the-middle techniques to spoof an SSL server.
CVSS Base score: 4.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/79984 for the current score.
CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N)
Affected Products and Versions
| Affected Product(s) | Version(s) |
| IBM TRIRIGA | All |
Remediation/Fixes
| Product | VRMF |
Remediation/First Fix
|
| IBM TRIRIGA Application Platform | 3.6.1.3 | The fix is available for download on FixCentral. |
| IBM TRIRIGA Application Platform | 3.7.0.1 | The fix is available for download on FixCentral |
| IBM TRIRIGA Application Platform | 3.8.0.1 | The fix is available for download on FixCentral |
| IBM TRIRIGA Application Platform | 4.0.2 | The fix is available for download on FixCentral |
| IBM TRIRIGA Application Platform | 4.1.1 | The fix is available for download on FixCentral |
Workarounds and Mitigations
None
Get Notified about Future Security Bulletins
References
Change History
29 Aug 2022: Initial Publication
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
Disclaimer
Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.
Document Location
Worldwide
Was this topic helpful?
Document Information
Modified date:
30 August 2022
Initial Publish date:
29 August 2022
UID
ibm16616305