IBM Support

Security Bulletin: An XML External Entity (XXE) processing vulnerability is exposed in Case Manager administration client (CVE-2018-1844)

Security Bulletin


Summary

IBM Case Manager has addressed the following vulnerability. An XML External Entity (XXE) processing vulnerability is exposed in Case Manager administration client with the ability to import solution packaged which are FileNet Deployment Manager exported zip packages. (CVE-2018-1844)

Vulnerability Details

CVEID: CVE-2018-1844
DESCRIPTION: IBM Case Manager is vulnerable to a XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources.
CVSS Base Score: 7.1
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/150904 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L)

Affected Products and Versions

Affected IBM Case Manager Affected Versions
IBM Case Manager 5.3.X
IBM Case Manager 5.2.1
IBM Case Manager 5.2.0
IBM Case Manager 5.1.1

Remediation/Fixes

Product

VRMF
APAR
Remediation/First Fix
IBM Case Manager 5.3.0.0 - 5.3.3.0 PJ45232 5.3.3.0-ICM-IF003 or later versions
IBM Case Manager 5.2.1.0 - 5.2.1.7 PJ45226 5.2.1.7-ICM-IF004 or later

The fix will require the application server running IBM Case Manager to be configured with Java 8. Please refer to application server documentation on the application server requirements and configuration changes needed to run with Java 8.

IBM Case Manager V5.2.0 is not fixed as the fix requires JDK 1.8 and this will not be compatible with the application server versions that is supported with this version of Case Manager. IBM recommends upgrading to a fixed, supported version/release/platform of the product.

IBM Case Manager V5.1.1 is no longer in full support; IBM recommends upgrading to a fixed, supported version/release/platform of the product.

Workarounds and Mitigations

The issue can be mitigated by preventing XXE injection into the solution zip package in doing the following:

  1. Ensuring that the solution package export and import process is well controlled, where the package is not exposed to modification.
  2. Generating a checksum for the solution export zip package immediately after export, and validating the checksum prior to import to ensure package consistency.

Get Notified about Future Security Bulletins

References

Off

Change History

06 Nov 2018: Original version published

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

Internal Use Only

Advisory ID 12005 / Product Record ID 115320 / CVE-2018-1844

[{"Business Unit":{"code":"BU053","label":"Cloud & Data Platform"},"Product":{"code":"SSCTJ4","label":"IBM Case Manager"},"Component":"","Platform":[{"code":"PF002","label":"AIX"},{"code":"PF016","label":"Linux"},{"code":"PF033","label":"Windows"}],"Version":"All Versions","Edition":"","Line of Business":{"code":"LOB45","label":"Automation"}}]

Document Information

Modified date:
04 March 2019

UID

ibm10734193