IBM Support

Security Bulletin: HTTP Header Injection Vulnerability Addressed in Asset and Service Management (CVE-2014-3026)

Security Bulletin


Summary

Header injection in HTTP responses can allow for HTTP response splitting, Session fixation via the Set-Cookie header, cross-site scripting (XSS), and malicious redirects attacks via the location header in Maximo Asset Mgmt, and SmartCloud Control Desk.

Vulnerability Details

DESCRIPTION:
Customers who have Maximo Asset Management, Maximo Asset Management Essentials, Maximo Industry Solutions (including Maximo for Government, Maximo for Nuclear Power, Maximo for Transportation, Maximo for Life Sciences, Maximo for Oil and Gas and Maximo for Utilities), and SmartCloud Control Desk are potentially impacted by this vulnerability, which can cause issues related to confidentiality.

CVE-2014-3026
CVSS Base Score: 3.5
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/93065
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:S/C:N/I:P/A:N)
APAR: IV57382

Affected Products and Versions


1. Maximo Asset Management 7.5
2. Maximo Asset Management Essentials 7.5
3. Maximo for Government 7.5
4. Maximo for Nuclear Power 7.5
5. Maximo for Transportation 7.5
6. Maximo for Life Sciences 7.5
7. Maximo for Oil and Gas 7.5
8. Maximo for Utilities 7.5
9. SmartCloud Control Desk 7.5

It is likely that earlier versions of affected products are also affected by these vulnerabilities. Remediation is not provided for product versions that are no longer supported. IBM recommends that customers upgrade to the latest supported version of products in order to obtain remediation for the vulnerabilities.

Remediation/Fixes

VENDOR FIXES:
The recommended solution is to download the appropriate Interim Fix or Fix Pack from Fix Central (What is Fix Central?) and apply for each affected product as soon as possible. Please see below for information on the fixes available for each product, version, and release. Follow the installation instructions in the ‘readme’ documentation provided with each fix pack or interim fix.

For Maximo Asset Management, Maximo Asset Management Essentials and Maximo Industry Solutions 7.5:

VRMFFix Pack or Interim FixDownload
7.5.0.6Maximo 7.5.0.6 Interim Fix:
7.5.0.6-TIV-MAM-IFIX001 or latest Interim Fix available
FixCentral

For SmartCloud Control Desk 7.5:
VRMFFix Pack or Interim FixDownload
7.5.0.3Maximo 7.5.0.6 Interim Fix:
7.5.0.6-TIV-MAM-IFIX001 or latest Interim Fix available
FixCentral
7.5.1.2Maximo 7.5.0.6 Interim Fix:
7.5.0.6-TIV-MAM-IFIX001 or latest Interim Fix available
FixCentral

If assistance is needed in determining the appropriate Fix Pack or Interim Fix level, contact IBM Technical Support. It is recommended that you always request the latest available Fix Pack or Interim Fix.

Due to the threat posed by a successful attack, IBM strongly recommends that customers apply fixes as soon as possible.

Workarounds and Mitigations

Until you apply the fixes, it may be possible to reduce the risk of successful attack by restricting network protocols required by an attack. For attacks that require certain privileges or access to certain packages, removing the privileges or the ability to access the packages from unprivileged users may help reduce the risk of successful attack. Both approaches may break application functionality, so IBM strongly recommends that customers test changes on non-production systems. Neither approach should be considered a long-term solution as neither corrects the underlying problem.

Get Notified about Future Security Bulletins

References

Off

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Flash.

Note:
According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

Acknowledgement

None

Change History

Change History
07/24/14 Flash published

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

[{"Product":{"code":"SSLKT6","label":"Maximo Asset Management"},"Business Unit":{"code":"BU005","label":"IoT"},"Component":"--","Platform":[{"code":"PF025","label":"Platform Independent"}],"Version":"7.5","Edition":""},{"Product":{"code":"SSWK4A","label":"Maximo Asset Management Essentials"},"Business Unit":{"code":"BU005","label":"IoT"},"Component":" ","Platform":[{"code":"","label":""}],"Version":"7.5","Edition":""},{"Product":{"code":"SSMQTP","label":"Maximo for Government"},"Business Unit":{"code":"BU005","label":"IoT"},"Component":" ","Platform":[{"code":"","label":""}],"Version":"7.5","Edition":""},{"Product":{"code":"SSLL8M","label":"Maximo for Nuclear Power"},"Business Unit":{"code":"BU005","label":"IoT"},"Component":" ","Platform":[{"code":"","label":""}],"Version":"7.5;7.5.1","Edition":""},{"Product":{"code":"SSLL9Z","label":"Maximo for Transportation"},"Business Unit":{"code":"BU005","label":"IoT"},"Component":" ","Platform":[{"code":"","label":""}],"Version":"7.5;7.5.1","Edition":""},{"Product":{"code":"SSLL84","label":"Maximo for Life Sciences"},"Business Unit":{"code":"BU005","label":"IoT"},"Component":" ","Platform":[{"code":"","label":""}],"Version":"7.5","Edition":""},{"Product":{"code":"SSLL9G","label":"Maximo for Oil and Gas"},"Business Unit":{"code":"BU005","label":"IoT"},"Component":" ","Platform":[{"code":"","label":""}],"Version":"7.5;7.5.1","Edition":""},{"Product":{"code":"SSLLAM","label":"Maximo for Utilities"},"Business Unit":{"code":"BU005","label":"IoT"},"Component":" ","Platform":[{"code":"","label":""}],"Version":"7.5","Edition":""},{"Product":{"code":"SSWT9A","label":"Control Desk"},"Business Unit":{"code":"BU004","label":"Hybrid Cloud"},"Component":" ","Platform":[{"code":"","label":""}],"Version":"7.5;7.5.1","Edition":""}]

Document Information

Modified date:
17 June 2018

UID

swg21678798