IBM Support

Security Bulletin: Apache Commons FileUpload library in IBM Workload Console can allow a remote attacker to execute arbitrary code on the system (CVE-2016-1000031)

Security Bulletin


Summary

Apache Commons FileUpload library, located in commons-fileupload-1.2.2.jar that is installed with IBM Dynamic Workload Console, could allow a remote attacker to execute arbitrary code on the system, caused by deserialization of untrusted data in DiskFileItem class of the FileUpload library.

Vulnerability Details

CVEID: CVE-2016-1000031
DESCRIPTION:
 Apache Commons FileUpload, as used in Novell NetIQ Sentinel and other products, could allow a remote attacker to execute arbitrary code on the system, caused by deserialization of untrusted data in DiskFileItem class of the FileUpload library. A remote attacker could exploit this vulnerability to execute arbitrary code under the context of the current process.
CVSS Base Score: 9.8
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/117957 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

Affected Products and Versions

IBM Workload Dynamic Console 8.6.0 FP04 and earlier
IBM Workload Dynamic Console 9.1.0 FP02 and earlier
IBM Workload Dynamic Console 9.2.0 FP02 and earlier
IBM Workload Dynamic Console 9.3.0 FP03 and earlier

Remediation/Fixes

APAR IJ02685 has been opened to address the FileUpload library vulnerability for IBM Dynamic Workload Console.

The apar will be fixed in the following fixpacks

8.6.0-TIV-TWS-FP0005
9.1.0-TIV-TWS-FP0003
9.2.0-TIV-TWS-FP0003
9.3.0-TIV-TWS-FP0004

The vulnerability has already been fixed in 9.4.0-TIV-TWS-FP0002.

For Unsupported releases IBM recommends upgrading to a fixed, supported release of the product.

Workarounds and Mitigations

Not Applicable

Get Notified about Future Security Bulletins

References

Off

Change History

Dec 28 2017: Original version published
Jan 18th 2018: Removed cvss2 link

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer

Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.

[{"Product":{"code":"SSGSPN","label":"IBM Workload Scheduler"},"Business Unit":{"code":"BU053","label":"Cloud & Data Platform"},"Component":"Tivoli Dynamic Workload Console","Platform":[{"code":"PF025","label":"Platform Independent"}],"Version":"8.6;9.1;9.2;9.3","Edition":"All Editions","Line of Business":{"code":"LOB45","label":"Automation"}}]

Document Information

Modified date:
17 June 2018

UID

swg22012168