IBM Support

Security Bulletin: Potential security vulnerability in WebSphere Application Server MQ JCA Resource adapter (CVE-2016-0360)

Security Bulletin


Summary

There is a potential security vulnerability with the WebSphere Application Server MQ JCA Resource adapter.

Vulnerability Details

CVEID: CVE-2016-0360
DESCRIPTION:
IBM Websphere MQ JMS 7.0.1, 7.1, 7.5, 8.0, and 9.0 client provides classes that deserialize objects from untrusted sources which could allow a malicious user to execute arbitrary Java code by adding vulnerable classes to the classpath.
CVSS Base Score: 8.1
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/111930 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)

Affected Products and Versions

This vulnerability affects the following versions and releases of IBM WebSphere Application Server traditional:

  • Version 9.0
  • Version 8.5 and Version 8.5.5
  • Version 8.0
  • Version 7.0

Remediation/Fixes

The recommended solution is to apply the interim fix, Fix Pack or PTF containing the APAR for each named product as soon as practical. After applying the Interim Fix or moving up to the fix pack level with fix, follow the ClassName whitelisting instructions in the Reference section.


For WebSphere Application Server traditional and WebSphere Application Server Hypervisor edition:

For V9.0.0.0 through 9.0.0.2:

· Upgrade to Fix Pack 9.0.0.1 or later and then apply Interim Fix PI74874 and then follow instructions in reference section to apply ClassName serialization whitelisting.
--OR--
· Apply Fix Pack 9.0.0.3 or later and then follow instructions in reference section to apply ClassName serialization whitelisting.

For V8.5.0.0 through 8.5.5.11:

· Upgrade to Fix Pack Level 8.5.5.9 or later and then apply Interim Fix PI74862 and then follow instructions in reference section to apply ClassName serialization whitelisting.
--OR--
· Apply Fix Pack 8.5.5.12 or later and then follow instructions in reference section to apply ClassName serialization whitelisting.

For V8.0.0.0 through 8.0.0.13:

· Upgrade to Fix Pack 8.0.0.12 or later and then apply Interim Fix PI74468 and then follow instructions in reference section to apply ClassName serialization whitelisting.
--OR--
· Apply Fix Pack 8.0.0.14 or later and then follow instructions in reference section to apply ClassName serialization whitelisting.

For V7.0.0.0 through 7.0.0.41:

· Upgrade to Fix Pack 7.0.0.41 and then apply Interim Fix PI74468 and then follow instructions in reference section to apply ClassName serialization whitelisting.
--OR--
· Apply Fix Pack 7.0.0.43 or later and then follow instructions in reference section to apply ClassName serialization whitelisting.

Workarounds and Mitigations

IBM WebSphere MQ supports Object Messages as part of the JMS specification, however ObjectMessage usage is discouraged. To mitigate this vulnerability, message types that do not contain this security flaw, such as JSON or XML, should be used. To ensure that messages come from recognized senders, a security mechanism, such as MQ's AMS (Advanced Message Security), can be used.

Get Notified about Future Security Bulletins

Important Note

IBM strongly suggests that all System z customers be subscribed to the System z Security Portal to receive the latest critical System z security and integrity service. If you are not subscribed, see the instructions on the System z Security web site. Security and integrity APARs and associated fixes will be posted to this portal. IBM suggests reviewing the CVSS scores and applying all security or integrity fixes as soon as possible to minimize any potential risk.

References

Off

Acknowledgement

Vulnerability discovery by Matthias Kaiser of Code White (www.code-white.com)

Change History

08 March 2017: original document published
14 March 2017: added link to whitelisting document
28 March 2017: updated cve description

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

[{"Product":{"code":"SSEQTP","label":"WebSphere Application Server"},"Business Unit":{"code":"BU004","label":"Hybrid Cloud"},"Component":"--","Platform":[{"code":"PF002","label":"AIX"},{"code":"PF010","label":"HP-UX"},{"code":"PF016","label":"Linux"},{"code":"PF027","label":"Solaris"},{"code":"PF033","label":"Windows"},{"code":"PF035","label":"z\/OS"}],"Version":"9.0;8.5;8.0;7.0","Edition":"Advanced;Base;Developer;Enterprise;Network Deployment"}]

Document Information

Modified date:
15 June 2018

UID

swg21996748