Security Bulletin
Summary
Rational DOORS Web Access has addressed the following vulnerabilities.
Vulnerability Details
CVEID: CVE-2018-8034
DESCRIPTION: Apache Tomcat could allow a remote attacker to bypass security restrictions, caused by a missing host name verification when using TLS with the WebSocket client. An attacker could exploit this vulnerability to bypass security constraints to access restricted resources.
CVSS Base Score: 3.7
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/147211 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N)
CVEID: CVE-2018-11784
DESCRIPTION: Apache Tomcat could allow a remote attacker to conduct phishing attacks, caused by an open redirect vulnerability in the default servlet. An attacker could exploit this vulnerability using a specially-crafted URL to redirect a victim to arbitrary Web sites.
CVSS Base Score: 7.4
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/150860 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N)
Affected Products and Versions
Rational DOORS Web Access: 9.5.0 - 9.5.0.8
Rational DOORS Web Access: 9.5.1 - 9.5.1.10
Rational DOORS Web Access: 9.5.2 - 9.5.2.9
Rational DOORS Web Access: 9.6.0 - 9.6.0.8
Rational DOORS Web Access: 9.6.1 - 9.6.1.11
Remediation/Fixes
Upgrade to the version of Apache Tomcat shown in the table below. You can upgrade Apache Tomcat after installing Rational DOORS Web Access.
The following table presents Rational DOORS Web Access versions and the released versions of Apache Tomcat.
| Rational DOORS Web Access | Apache Tomcat |
| 9.5.0 - 9.5.0.8 | 7.0.91 |
| 9.5.1 - 9.5.1.10 | 7.0.91 |
| 9.5.2 - 9.5.2.9 | 7.0.91 |
| 9.6.0 - 9.6.0.8 | 7.0.91 |
| 9.6.1 - 9.6.1.11 | 7.0.91 |
For versions of Rational DOORS Web Access that are earlier than version 9.5.0.x, IBM recommends upgrading to a fixed, supported version/release/platform of the product.
Procedure:
- Download the required version of Apache Tomcat or later core zip file from the Apache or Tomcat 7 Archive download site. For example:
apache-tomcat-7.0.91-windows-x64.zip
apache-tomcat-7.0.91-windows-x86.zip
apache-tomcat-7.0.91.tar.gz
- Go to the Rational DOORS Web Access installation directory.
For example:
C:\Program Files\IBM\Rational\DOORS Web Access\9.version
- Rename the server directory to server.orig.
- Extract the downloaded Apache Tomcat core compressed file to ./server in the Rational DOORS Web Access installation directory.
- Delete the contents of the ./server/webapps folder
- Copy the following jar files from your ./server.orig/lib directory to ./server/lib
commons-logging-1.1.x.jar
dwa-catalina.jar
log4j-1.2.x.jar
log4j.properties
- Remove the following jar files from the ./server/lib directory
tomcat7-websocket.jar
websocket-api.jar
- Copy your ./server.orig/festival directory to ./server/festival.
- Copy the ./server.orig/conf/server.xml file to ./server/conf/server.xml.
- Copy ./server.orig/webapps/*.war to ./server/webapps.
- Optional: Copy any customized files from the ./server.orig directory to ./server.
- UNIX systems only: Run the ./configure-festival.sh command, as described in the help topic Installing the web access server and the web access broker on Linux or Solaris systems.
Workarounds and Mitigations
None
Get Notified about Future Security Bulletins
References
Change History
23 October 2018: Original version published
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
Disclaimer
Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.
Was this topic helpful?
Document Information
Modified date:
23 October 2018
UID
ibm10735863