TADDM security improvement deployed started from TADDM 184.108.40.206 and in TADDM 7.2.2 avoids vulnerability in embedded TADDM BIRT-Report Viewer application.
Embedded in TADDM BIRT-Report Viewer application component was found to be vulnerable to a directory traversal attack that allows for arbitrary files to be read from the underlying server.
CVSS Base Score: 3.5
CVSS Temporal Score: https://exchange.xforce.ibmcloud.com/vulnerabilities/84145
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:S/C:P/I:N/A:N)
Affected Products and Versions
TADDM 7.1.2, 220.127.116.11 through 18.104.22.168 (later TADDM releases contain parameter that allow to disable BIRT-Report)
Upgrade to TADDM 22.214.171.124 or 126.96.36.199.
Starting with TADDM version 188.8.131.52 and 184.108.40.206 we have added a $COLLATION_HOME/dist/collation.properties value to disable BIRT reports:
com.ibm.taddm.birtviewer.enabled=false (default is true)
This parameter change requires a restart of TADDM server.
If you are unable to upgrade apply workaround, or please contact IBM Support.
Workarounds and Mitigations
1. Stop TADDM server
2. Remove (or backup):
and $COLLATION_HOME/external/apache-tomcat-x.x.xx/work/Catalina/localhost directory,
3. Start TADDM server
4. Data Management Portal user will not able to run the BIRT reports.
Get Notified about Future Security Bulletins
7 May 2014: Original Copy Published
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.
17 June 2018