-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2015.0433
       Security Bulletin: IBM Curam is susceptible to a Open Source
                  CKEditor vulnerability (CVE-2014-5191)
                             24 February 2015

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM Curam Social Program Management
Publisher:         IBM
Operating System:  AIX
                   HP-UX
                   Linux variants
                   Solaris
                   Windows
                   z/OS
Impact/Access:     Cross-site Scripting -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2014-5191  

Reference:         ESB-2015.0025
                   ESB-2014.1979

Original Bulletin: 
   http://www-01.ibm.com/support/docview.wss?uid=swg21697246

- --------------------------BEGIN INCLUDED TEXT--------------------

Security Bulletin: IBM Curam is susceptible to a Open Source CKEditor 
vulnerability (CVE-2014-5191).

Security Bulletin

Document information

More support for:

Curam Social Program Management

Software version:

6.0.4, 6.0.5

Operating system(s):

AIX, HP-UX, Linux, Solaris, Windows, z/OS

Reference #:

1697246

Modified date:

2015-02-23

Summary

IBM Curam Social Program Management is vulnerable to Reflected Cross-Site 
Scripting(XSS). This is caused by improper sanitization of user-supplied data
in the Preview Plugin for CKEditor.

Vulnerability Details

CVE ID: CVE-2014-5191

The Preview Plugin for CKEditor is vulnerable to cross-site scripting, caused
by improper escaping of user input. This allows for untrusted data, such as 
malicious JavaScript, to be reflected back and executed.

*CVSS:

Base Score: 4.3

  Access Vector: Network

  Access Complexity: Medium

  Authentication: None

  Confidentiality Impact: None

  Integrity Impact: Partial

  Availability Impact: None

Affected Products and Versions

The Curam product is affected in versions:

6.0.4.4

6.0.4.5

6.0.5

The product version 6.0.5.5a is NOT affected.

Remediation/Fixes

Product 	VRMF 		Remediation/First Fix

Curam SPM 	6.0.4.4 	Visit IBM Fix Central and upgrade to 6.0.4.5 iFix10 or a 
				subsequent 6.0.4 release.

Curam SPM 	6.0.4.5 	Visit IBM Fix Central and upgrade to 6.0.4.5 iFix10 or a 
				subsequent 6.0.4 release.

Curam SPM 	6.0.5 		Visit IBM Fix Central and upgrade to 6.0.5.6 or a subsequent 
				6.0.5 release.

Workarounds and Mitigations

The preview.html file can be removed from the CKEditor/plugins/preview 
directory so that the issue cannot be exploited.

Get Notified about Future Security Bulletins

Subscribe to My Notifications to be notified of important product support 
alerts like this.

Important note

IBM strongly suggests that all System z customers be subscribed to the System
z Security Portal to receive the latest critical System z security and 
integrity service. If you are not subscribed, see the instructions on the 
System z Security web site. Security and integrity APARs and associated fixes
will be posted to this portal. IBM suggests reviewing the CVSS scores and 
applying all security or integrity fixes as soon as possible to minimize any 
potential risk.

References

Complete CVSS Guide

On-line Calculator V2

CKEditor Web site: CKEditor 4.4.3.

Related information

IBM Secure Engineering Web Portal

IBM Product Security Incident Response Blog

Change History

Original version published 23 February 2015

*The CVSS Environment Score is customer environment specific and will 
ultimately impact the Overall CVSS Score. Customers can evaluate the impact of
this vulnerability in their environments by accessing the links in the 
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the 
Common Vulnerability Scoring System (CVSS) is an "industry open standard 
designed to convey vulnerability severity and help to determine urgency and 
priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY 
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS 
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT 
OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=mfN7
-----END PGP SIGNATURE-----