IBM Support

Security Bulletin: Multiple vulnerabilities affect IBM Data Virtualization on Cloud Pak for Data (February 2025)

Security Bulletin


Summary

Multiple vulnerabilities have been addressed in IBM Data Virtualization on Cloud Pak for Data. Note that IBM Data Virtualization was named Watson Query in IBM Cloud Pak for Data version 4.6, 4.7, and 4.8.

Vulnerability Details

CVEID:   CVE-2024-4067
DESCRIPTION:   Node.js micromatch module is vulnerable to a denial of service, caused by a regular expression denial of service (ReDoS) flaw in micromatch.braces() in index.js. By sending a specially crafted payload, a remote attacker could exploit this vulnerability to increase the consumption time until the application hangs or slows down.
CWE:   CWE-1333: Inefficient Regular Expression Complexity
CVSS Source:   CVE.org
CVSS Base score:   5.3
CVSS Vector:   (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)

CVEID:   CVE-2024-43800
DESCRIPTION:   expressjs serve-static is vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A remote attacker could exploit this vulnerability using a specially crafted URL to execute script in a victim's Web browser within the security context of the hosting Web site, once the URL is clicked. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials.
CWE:   CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVSS Source:   IBM X-Force
CVSS Base score:   5
CVSS Vector:   (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L)

CVEID:   CVE-2024-6531
DESCRIPTION:   Node.js Bootstrap module is vulnerable to cross-site scripting, caused by improper validation of user-supplied input by the carousel component. By crafting malicious input in the data-slide attribute, a remote attacker could exploit this vulnerability using the href attribute of an tag to inject malicious script into a Web page which would be executed in a victim's Web browser within the security context of the hosting Web site, once the page is viewed. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials.
CWE:   CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVSS Source:   HeroDevs
CVSS Base score:   6.4
CVSS Vector:   (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:L)

CVEID:   CVE-2024-45590
DESCRIPTION:   expressjs body-parser is vulnerable to a denial of service, caused by a flaw when url encoding is enabled. By sending a specially crafted payload, a remote attacker could exploit this vulnerability to cause a denial of service condition.
CWE:   CWE-405: Asymmetric Resource Consumption (Amplification)
CVSS Source:   IBM X-Force
CVSS Base score:   7.5
CVSS Vector:   (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID:   CVE-2024-43799
DESCRIPTION:   pillarjs send is vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A remote attacker could exploit this vulnerability using a specially crafted URL to execute script in a victim's Web browser within the security context of the hosting Web site, once the URL is clicked. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials.
CWE:   CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVSS Source:   IBM X-Force
CVSS Base score:   5
CVSS Vector:   (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L)

CVEID:   CVE-2024-45296
DESCRIPTION:   path-to-regexp turns path strings into a regular expressions. In certain cases, path-to-regexp will output a regular expression that can be exploited to cause poor performance. Because JavaScript is single threaded and regex matching runs on the main thread, poor performance will block the event loop and lead to a DoS. The bad regular expression is generated any time you have two parameters within a single segment, separated by something that is not a period (.). For users of 0.1, upgrade to 0.1.10. All other users should upgrade to 8.0.0.
CWE:   CWE-1333: Inefficient Regular Expression Complexity
CVSS Source:   CVE.org
CVSS Base score:   7.5
CVSS Vector:   (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID:   CVE-2024-52798
DESCRIPTION:   path-to-regexp turns path strings into a regular expressions. In certain cases, path-to-regexp will output a regular expression that can be exploited to cause poor performance. The regular expression that is vulnerable to backtracking can be generated in the 0.1.x release of path-to-regexp. Upgrade to 0.1.12. This vulnerability exists because of an incomplete fix for CVE-2024-45296.
CWE:   CWE-1333: Inefficient Regular Expression Complexity
CVSS Source:   security-advisories@github.com
CVSS Base score:   7.7
CVSS Vector:   (CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X)

CVEID:   CVE-2024-4068
DESCRIPTION:   Node.js braces module is vulnerable to a denial of service, caused by the failure to limit the number of characters it can handle. leading to a memory exhaustion in lib/parse.js. By sending imbalanced braces as input, the parsing will enter a loop causing the JavaScript heap limit to be reached, and the program will crash.
CWE:   CWE-1050: Excessive Platform Resource Consumption within a Loop
CVSS Source:   IBM X-Force
CVSS Base score:   7.5
CVSS Vector:   (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID:   CVE-2024-43796
DESCRIPTION:   expressjs express is vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A remote attacker could exploit this vulnerability using a specially crafted URL to execute script in a victim's Web browser within the security context of the hosting Web site, once the URL is clicked. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials.
CWE:   CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVSS Source:   IBM X-Force
CVSS Base score:   5
CVSS Vector:   (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L)

CVEID:   CVE-2024-39338
DESCRIPTION:   Axios is vulnerable to server-side request forgery, caused by a flaw with requests for path relative URLs get processed as protocol relative URLs. By sending a specially crafted request, an attacker could exploit this vulnerability to conduct SSRF attack.
CWE:   CWE-918: Server-Side Request Forgery (SSRF)
CVSS Source:   IBM X-Force
CVSS Base score:   7.5
CVSS Vector:   (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)

Affected Products and Versions

Note: The name of the Watson Query service is different depending on the version of Cloud Pak for Data, as follows:

  • In Cloud Pak for Data versions 4.5 and earlier, the service name is Data Virtualization.
  • In versions 4.6, 4.7, and 4.8, the name is Watson Query.
  • In versions 5.0 and later, the name is Data Virtualization.
Affected Product(s) DV Version(s) CPD Version(s)
Data Virtualization on Cloud Pak for Data 3.0 5.0
IBM Watson Query on Cloud Pak for Data 2.2 4.8
IBM Watson Query on Cloud Pak for Data 2.1 4.7
IBM Watson Query on Cloud Pak for Data 2.0 4.6
Data Virtualization on Cloud Pak for Data 1.8 4.5
Data Virtualization on Cloud Pak for Data 1.7 4.0

Remediation/Fixes

Affected Product(s) Data Virtualization (DV) Version(s) Cloud Pak for Data (CPD) Version(s) Fixes
IBM Data Virtualization on Cloud Pak for Data

3.0.0 - 3.0.3

5.0.0 - 5.0.3

Upgrade to version 3.1.0 or later Refresh (DV) / 5.1.0 (CPD).

Refer to the details and links following this table for the appropriate upgrade topic that applies to your installation.

IBM Watson Query on Cloud Pak for Data

2.2.0 - 2.2.5

4.8.0 - 4.8.7

Upgrade to version 2.2.8 or later Refresh (DV) / 4.8.8 (CPD).

Refer to the details and links following this table for the appropriate upgrade topic that applies to your installation.

IBM Watson Query on Cloud Pak for Data 2.1.0 - 2.1.3

4.7.0 - 4.7.4

Upgrade to version 2.2.8 or later Refresh (DV) / 4.8.8 (CPD).

Refer to the details and links following this table for the appropriate upgrade topic that applies to your installation.

IBM Watson Query on Cloud Pak for Data 2.0.0 - 2.0.4

4.6.0 - 4.6.6

Upgrade to version 2.2.8 or later Refresh (DV) / 4.8.8 (CPD).

Refer to the details and links following this table for the appropriate upgrade topic that applies to your installation.

IBM Data Virtualization on Cloud Pak for Data 1.8.0 - 1.8.3

4.5.0 - 4.5.3

Upgrade to version 2.1.3 (DV) / 4.7.4 (CPD)

and then

Upgrade to version 2.2.8 or later Refresh (DV) / 4.8.8 (CPD).

Refer to the details and links following this table for the appropriate upgrade topic that applies to your installation.

IBM Data Virtualization on Cloud Pak for Data 1.7.0 - 1.7.8

4.0.0 - 4.0.9

Upgrade to version 2.0.4 (DV) / 4.6.6 (CPD)

and then

Upgrade to version 2.2.8 or later Refresh (DV) / 4.8.8 (CPD).

Refer to the details and links following this table for the appropriate upgrade topic that applies to your installation.

IBM strongly recommends upgrading to the most recent version of IBM Data Virtualization on Cloud Pak for Data now. You must update IBM Cloud Pak for Data to the appropriate version listed in the table above prior to upgrading Data Virtualization. Depending on your installed version you might have to upgrade to an intermediate version before you upgrade to the latest available version as described above.

Starting in IBM Cloud Pak for Data Version 5.1, the control plane is called IBM Software Hub. You can upgrade from older versions of IBM Cloud Pak for Data to IBM Software Hub Version 5.1. Depending on the current version of IBM Cloud Pak for Data that you are running, you might not be able upgrade directly from that version to IBM Software Hub Version 5.1. Use the following guidance to upgrade your existing installation to IBM Software Hub Version 5.1:

To update IBM Cloud Pak for Data, refer to the appropriate link depending on your installed version:

To update Data Virtualization on Cloud Pak for Data, refer to the appropriate link depending on your installed version:

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

References

Off

Acknowledgement

Change History

3 Apr 2025: Additional detail on upgrade instructions
21 Feb 2025: Initial Publication

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY. In addition to other efforts to address potential vulnerabilities, IBM periodically updates the record of components contained in our product offerings. As part of that effort, if IBM identifies previously unidentified packages in a product/service inventory, we address relevant vulnerabilities regardless of CVE date. Inclusion of an older CVEID does not demonstrate that the referenced product has been used by IBM since that date, nor that IBM was aware of a vulnerability as of that date. We are making clients aware of relevant vulnerabilities as we become aware of them. "Affected Products and Versions" referenced in IBM Security Bulletins are intended to be only products and versions that are supported by IBM and have not passed their end-of-support or warranty date. Thus, failure to reference unsupported or extended-support products and versions in this Security Bulletin does not constitute a determination by IBM that they are unaffected by the vulnerability. Reference to one or more unsupported versions in this Security Bulletin shall not create an obligation for IBM to provide fixes for any unsupported or extended-support products or versions.

Document Location

Worldwide

[{"Business Unit":{"code":"BU048","label":"IBM Software"},"Product":{"code":"SSK1AQ","label":"IBM Data Virtualization"},"Component":"","Platform":[{"code":"PF016","label":"Linux"},{"code":"PF040","label":"RedHat OpenShift"}],"Version":"1.7, 1.8, 2.0, 2.1, 2.2, 3.0","Edition":"","Line of Business":{"code":"LOB76","label":"Data Platform"}}]

Document Information

Modified date:
14 April 2025

Initial Publish date:
21 February 2025

UID

ibm17183852