-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2013.1823
          IBM SPSS Statistics IEHS - XSS issue in workingSet.jsp
                             19 December 2013

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM SPSS Statistics
Publisher:         IBM
Operating System:  AIX
                   HP-UX
                   Linux variants
                   OS X
                   Solaris
                   Windows
Impact/Access:     Cross-site Scripting -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2013-5449  

Reference:         ESB-2013.1729

Original Bulletin: 
   http://www-01.ibm.com/support/docview.wss?uid=swg21659930

- --------------------------BEGIN INCLUDED TEXT--------------------

IBM SPSS Statistics IEHS - XSS issue in workingSet.jsp (CVE-2013-5449)

Security Bulletin

Document information

More support for:

SPSS Statistics

Software version:

21.0

Operating system(s):

AIX, HP-UX, Linux, Mac OS, Solaris, Windows

Reference #:

1659930

Modified date:

2013-12-17

Summary

There is a security vulnerability wher the user could attack IEHS by using on
"operation" parameter in workingSet.jsp page within IBM SPSS Statistics 21.

Vulnerability Details

CVE ID: CVE-2013-5449

DESCRIPTION:

The latest available installer for IBM SPSS Statistics Version 21, the user 
could attack IEHS by using on "operation" parameter in workingSet.jsp page.

As of December 11, 2013, IBM has not received any reports of customer issues 
related to these security vulnerabilities.

CVSS:

Using the Common Vulnerability Scoring System (CVSS) v2, the security ratings
for these issues are:

CVSS Base Score: 4.3

CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/88056 for the 
current score

CVSS Environmental Score*: Undefined

CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N)

Affected Products

IBM SPSS Statistics for Windows V21

Remediation/Fixes

The recommended solution is to download and install the IBM Statistics 21 FP2.

Fix* VRMF How to acquire fix

21.0-IM-S21STATS-WIN64-FP002 21.0.0.2 
http://delivery04.dhe.ibm.com/sar/CMA/IMA/043rz/0/21.0-IM-S21STATS-WIN64-FP002.exe

21.0-IM-S21STATS-WIN32-FP002 21.0.0.2 
http://delivery04.dhe.ibm.com/sar/CMA/IMA/043rx/0/21.0-IM-S21STATS-WIN32-FP002.exe

Fix Pack:

In order to install the fix, the user should install the current fix pack; 
download the available Statistics 21 Fix Pack 2, install the fix pack and 
reboot if necessary.

Download the appropriate platform Fix Pack from IBM Fix Central 
(21.0-IM-S21STATS-WIN64-FP002 or 21.0-IM-S21STATS-WIN32-FP002)

Install the IBM Statistics 21 Fix Pack 2 on top of your existing installation.

Reboot if necessary.

Workarounds/Mitigations

None known apply the workaround.

References:

Complete CVSS Guide

On-line Calculator V2

Related Information:

IBM Secure Engineering Web Portal

IBM Product Security Incident Response Blog

Acknowledgement:

These vulnerabilities were reported internally at IBM.

Change History

December 17, 2013 Original Copy Published

*The CVSS Environment Score is customer environment specific and will 
ultimately impact the Overall CVSS Score. Customers can evaluate the impact of
this vulnerability in their environments by accessing the links in the 
Reference section of this Security Bulletin.

Note: According to the Forum of Incident Response and Security Teams (FIRST),
the Common Vulnerability Scoring System (CVSS) is an "industry open standard 
designed to convey vulnerability severity and help to determine urgency and 
priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY 
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS 
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT 
OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=YCIw
-----END PGP SIGNATURE-----