-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2013.1130
        Security Bulletin: Vulnerability in IBM Advanced Management
                          Module (CVE-2013-4007)
                              19 August 2013

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM BladeCenter
Publisher:         IBM
Operating System:  Network Appliance
Impact/Access:     Execute Arbitrary Code/Commands -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2013-4007  

Original Bulletin: 
   http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5093491

- --------------------------BEGIN INCLUDED TEXT--------------------

Security Bulletin: Vulnerability in IBM Advanced Management Module 
(CVE-2013-4007) 


Abstract
Cross-Site Scripting (XSS) vulnerability is found in adv_sw.php page of IBM 
advanced Management Module.

Vulnerabily Details:|
CVE ID: CVE-2013-4007
Description:

A remote attacker could exploit this vulnerability to execute a script in a 
victim's web browser within the security context of the hosting web site, once 
the URL is clicked. An attacker could use this vulnerability to steal the 
victim's cookie-based authentication credentials. This attack does require that 
the user clicking the vulnerable link be authenticated with a valid user ID and 
password.

CVSS:
CVSS Base Score: 3.5
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/85274 for the 
current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:S/C:N/I:P/A:N)
Affected Products:

AMM FW versions before BPET64G, BBET64G

Remediation:

The recommended solution is to apply the fix to all previous versions as soon 
as practical. Please see below for information on the fixes available

Fix:

Update AMM firmware version to BPET64G and BBET64G. Firmware can be downloaded 
from IBM Fix Central.

Workaround(s) & Mitigation(s):
None

References:

Complete CVSS Guide
On-line Calculator V2
CVE-2013-4007
http://xforce.iss.net/xforce/xfdb/85274
Related Information:

IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog
IBM Fix Central

Acknowledgement:

This vulnerability was reported to IBM by Jens Regel of Schneider & Wulf 
EVD-Beratung.

Change History:

12 August 2013: Original copy published

Applicable countries and regions

    Worldwide

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBUhGuaBLndAQH1ShLAQJk1xAAsbZIEXc9nQkIY8ow7XCnRk+eAb9mAbSX
IPepnkimFkl6pDcR65BcNowGd+5vAI5O6E3sF+57KUF04iECzjT/Ui8hRALp28EQ
P0tU4fWmGFQrVVTW29uc5Zj05irSb8O6ii/QDBtz26I3b5VMgtI2KCyqqVyvLlk0
PtPtYTuzXnNdDRpVj5OvaRVdLl9l5wDzVMOKm3cKFE0oTvw51z1W3qS900VZmIXI
vCnBlKeddKnPlWtkg/9S/7FnmkbgeZKpOAJEDOs78XHQEyByxy0T0A6bnV3OOjKu
DAZxYDTXonS3H+MsAFfFigzwikug5Q7f1gNHNgHS+xjgXJYFgwyJGJ4WTu/oGTcR
E/175O5t7spgjdk13H4BYaU4S6uK8urJk9UTS9PL+y+vqtvGfEcav+MUZtFY/NLC
eR6Qq/yiKcxWnBGfAuW3k9AILTRCO17H+GSNx5YGiAlaA1EgqiPp87uNGoySDTXn
7fxarR19J7YOM52CnJUetGOSBFDq50ODZb/TIPOakTCYCXx3WcFiv3jo1az/7Pfu
OQm2PUl3uObWhZGKaoF+WN1TH7dvlTWRFpk38baKfZAnTXk3kejStqpoYWGgfJ4I
ao3zdMlNXE5pdQj0u8TDbAcJltn1VHqJkFIj7MXRR0oJdd1NTsebw/Hp2n4ffSN8
KJkaeoMMisY=
=tLnX
-----END PGP SIGNATURE-----