Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2012.0416 Vulnerabilities in Rational AppScan Enterprise, Rational PolicyTester and Reporting Console 30 April 2012 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Rational AppScan Enterprise Rational AppScan Tester Edition Rational AppScan Reporting Console Rational Policy Tester Publisher: IBM Operating System: Windows Impact/Access: Administrator Compromise -- Existing Account Execute Arbitrary Code/Commands -- Remote with User Interaction Modify Arbitrary Files -- Existing Account Overwrite Arbitrary Files -- Remote with User Interaction Cross-site Request Forgery -- Remote with User Interaction Cross-site Scripting -- Remote with User Interaction Access Confidential Data -- Remote/Unauthenticated Provide Misleading Information -- Remote with User Interaction Unauthorised Access -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2012-0737 CVE-2012-0736 CVE-2012-0735 CVE-2012-0734 CVE-2012-0733 CVE-2012-0732 CVE-2012-0731 CVE-2012-0730 CVE-2012-0729 CVE-2007-3633 Original Bulletin: http://www-01.ibm.com/support/docview.wss?uid=swg21592188 - --------------------------BEGIN INCLUDED TEXT-------------------- Security Bulletin: Vulnerabilities in Rational AppScan Enterprise, Rational PolicyTester and Reporting Console Flash (Alert) Document information Rational AppScan Enterprise Edition General Information Software version: 5.4, 5.5, 5.6, 8.0, 8.5 Operating system(s): Windows Reference #: 1592188 Modified date: 2012-04-26 Abstract Following an advanced ethical hacking activity conducted by IBM security experts, part of product testing mandated by the IBM Secure Engineering Framework, a series of security flaws in IBM Rational AppScan Enterprise, IBM Rational AppScan Tester Edition, IBM Rational AppScan Reporting Console and IBM Rational Policy Tester were uncovered. These vulnerabilities are addressed in a recently released product fix pack: 8.5.0.1 Fix Pack. Content VULNERABILITY DETAILS CVE ID(s): CVE-2012-0731, CVE-2012-0733, CVE-2012-0734, CVE-2012-0735, CVE-2012-0736 DESCRIPTION: Rational AppScan Enterprise may be vulnerable to several attacks caused by the impersonation of a service account with administrative privileges. CVE-2012-0731 CVSS Base Score: 6.8 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/74371 for the current score CVSS Environmental Score*: Undefined CVSS String: (AV:N/AC:L/Au:S/C:C/I:N/A:N) CVE-2012-0733 CVSS Base Score: 6 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/74374 for the current score CVSS Environmental Score*: Undefined CVSS String: (AV:N/AC:M/Au:S/C:P/I:P/A:P) CVE-2012-0734 CVSS Base Score: 7.6 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/74557 for the current score CVSS Environmental Score*: Undefined CVSS String: (AV:N/AC:H/Au:N/C:C/I:C/A:C) CVE-2012-0735 CVSS Base Score: 7.6 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/74558 for the current score CVSS Environmental Score*: Undefined CVSS String: (AV:N/AC:H/Au:N/C:C/I:C/A:C) CVE-2012-0736 CVSS Base Score: 9.3 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/74559 for the current score CVSS Environmental Score*: Undefined CVSS String: (AV:N/AC:M/Au:N/C:C/I:C/A:C) CVE ID: CVE-2012-0729 DESCRIPTION: Rational AppScan Enterprise could allow a remote attacker to upload arbitrary files, caused by the improper validation of file extensions on an administrative page. CVSS Base Score: 6.5 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/74366 for the current score CVSS Environmental Score*: Undefined CVSS String: (AV:N/AC:M/Au:S/C:P/I:P/A:P) CVE ID: CVE-2012-0737 DESCRIPTION: Rational AppScan Enterprise is vulnerable to cross-site scripting, caused by improper validation of user supplied input. An attacker could use this vulnerability to steal the victim cookie-based authentication credentials. CVSS Base Score: 3.5 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/74560 for the current score CVSS Environmental Score*: Undefined CVSS String: (AV:N/AC:M/Au:S/C:N/I:P/A:N) CVE ID: CVE-2007-3633 DESCRIPTION: Rational AppScan Enterprise is vulnerable to a Chilkat Zip issue which could allow an attacker to overwrite system files using specially crafted zip files. CVSS Base Score: 9.4 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/35294 for the current score CVSS Environmental Score*: Undefined CVSS String: (AV:N/AC:L/Au:N/C:N/I:C/A:C) NOTE: The following entries only apply to the 8.5.0.0 version of Rational AppScan Enterprise / Rational AppScan Tester/ Rational Policy Tester: CVE ID: CVE-2012-0730 DESCRIPTION: Rational AppScan Enterprise is vulnerable to cross-site request forgery, caused by improper validation of user supplied input by multiple scripts. By persuading an authenticated user to visit a malicious website, a remote attacker could gain administrative privileges on the Rational AppScan Enterprise server CVSS Base Score: 4.3 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/74370 for the current score CVSS Environmental Score*: Undefined CVSS String: (AV:N/AC:M/Au:N/C:N/I:P/A:N) CVE ID: CVE-2012-0732 DESCRIPTION: Rational AppScan Enterprise could allow a remote attacker to conduct spoofing attacks, caused by a failure to perform SSL certificate validation by the Rational AppScan Enterprise Console client. A remote attacker could exploit this vulnerability using man-in-the-middle techniques to launch further attacks against the victim. CVSS Base Score: 5 CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/74389 for the current score CVSS Environmental Score*: Undefined CVSS String: (AV:N/AC:M/Au:N/C:C/I:C/A:C) AFFECTED PLATFORMS: Versions 5.2 through 8.5 of Rational AppScan Enterprise, Rational AppScan Tester Edition, Rational Policy Tester and Rational AppScan Reporting Console running on Microsoft Windows are affected. REMEDIATION: The recommended solution is to apply the fix for each named product as soon as practical. Please see below for information about the fixes available. Fix: For Rational AppScan Enterprise, Rational AppScan Tester Edition, Rational Policy Tester and Rational AppScan Reporting Console: For version 5.4 to version 8.5 Apply the 8.5.0.1 Fix Pack If you are unable to upgrade to version 8.5.0.1, contact IBM Technical Support. Workaround: Not applicable; apply fixes. REFERENCES: Complete CVSS Guide On-line Calculator V2 *The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this alert. Note: According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY. Cross reference information Segment Product Component Platform Version Edition Application Servers Rational Policy Tester Accessibility Edition General Information Windows 5.4, 5.5, 5.6, 8.0, 8.5 Accessibility, Privacy, Quality Security Rational AppScan Reporting Console General Information Windows 5.4, 5.6, 5.5, 8.0 Reporting Console Security Rational AppScan Tester Edition General Information Windows 5.6, 8.0 Tester Copyright and trademark information IBM, the IBM logo and ibm.com are trademarks of International Business Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web at "Copyright and trademark information" at www.ibm.com/legal/copytrade.shtml. - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBT53gBu4yVqjM2NGpAQI+qw//cqnNfaebekWl8BLHy2ZF4v1lQua9SkRJ Shk35mgVyqM1SmwULxDvRgEj8e4sl6ejauLHHrBJbSXt62IvUBtYa0A1kbk1dz6E Y46l5ZSRS9liLBBHKCZG1h12N15xikzhu3iut8POXjFCM7znHMsuqbho/3uxFhXh O8I9977xl6UsH/souhnzt2m7PfjIo4eU8NaDlRn8a2SYGHaXb1B9zqOwQ6xlTNnl 2JrQt0ZVPdt2AjBUqweuS0pDtwMhDQLFwOWq7ifxO1wN0Zk5a7Jh8SdzN4wPh7Wj 1lIwiD+fKlvREiWRcXy/FjGxXngcEVSbJGdn3/gXmc1YtNlw74Kpi3+htcY/Cm0R ZoCO4TdWIA1NueOQvXOnWyDH4yf7n0eByQoxP5/bsa73tes6WpsV/IRoZ6R2DXQe uPucBxaqZUcaBPBZWV/vcAFmKDewMaM9SOUoJ0mmwHRPmzrRPkuXrgTkt535RqNf qHQV/mueV3pevivEFeXX2KusEb6B0Ze6cS+9yKhj8vIGWMggQUO6cWoht7whWnoT tApXhMApWUWhsgoWz1bsh6aAwvvBILKr9LzXHw6GKU4J6rxs51uFffjEfnGQ2pfs X9kWT9F07Pd+A05UxILszLNeeitbNBJHbTYjWT3RU5XT7xvHHXYqzSROncGiOo86 R/Ft595YTKk= =l0Wy -----END PGP SIGNATURE-----