SB2023062005 - Multiple vulnerabilities in IBM Copy Services Manager
Published: June 20, 2023 Updated: October 25, 2024
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 6 secuirty vulnerabilities.
1) Code Injection (CVE-ID: CVE-2021-23450)
The disclosed vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient sanitization of user-supplied data. A remote attacker can inject and execute arbitrary script code via the setObject function.
2) LDAP injection (CVE-ID: CVE-2021-39031)
The vulnerability allows a remote user to escalate privileges on the system.
The vulnerability exists due to improper input validation when processing DLAP queries. A remote user can send a specially crafted request to modify the original LDAP query and gain unauthorized access to the application.
3) Input validation error (CVE-ID: CVE-2018-25031)
The vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can trick the victim into opening a specially crafted URL to display remote OpenAPI definitions.
4) Use of a broken or risky cryptographic algorithm (CVE-ID: CVE-2022-22310)
The vulnerability allows a remote attacker to perform MitM attack.
The vulnerability exists due to usage of a weak cryptographic algorithms. A remote attacker can intercept and decrypt traffic.
5) Improper Restriction of Rendered UI Layers or Frames (CVE-ID: CVE-2021-46708)
The vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can trick the victim into opening a specially crafted URL to hijack the victim's click actions and possibly launch further attacks against the victim.
6) Spoofing attack (CVE-ID: CVE-2021-39038)
The vulnerability allows a remote attacker to perform clickjacking attack.
The vulnerability exists due to incorrect processing of user-supplied data, when REST API discovery is configured through the WebSphere administrative console Web Container settings to enable the API Discovery service, or through IBM WebSphere Application Server Liberty features mpOpenAPI-1.0, mpOpenAPI-1.1, mpOpenAPI-2.0, apiDiscovery-1.0, openapi-3.0 or openapi-3.1. A remote attacker can perform clickjacking attack.
Remediation
Install update from vendor's website.