-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2015.2291
        Security Bulletin: Multiple potential vulnerabilites in IBM
                          OpenPages GRC Platform
                             2 September 2015

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM OpenPages GRC Platform
Publisher:         IBM
Operating System:  AIX
                   Linux variants
                   Windows
Impact/Access:     Modify Arbitrary Files     -- Existing Account            
                   Cross-site Request Forgery -- Remote with User Interaction
                   Cross-site Scripting       -- Remote with User Interaction
                   Denial of Service          -- Existing Account            
                   Access Confidential Data   -- Existing Account            
Resolution:        Patch/Upgrade
CVE Names:         CVE-2015-0145 CVE-2015-0144 CVE-2015-0143
                   CVE-2015-0142 CVE-2015-0141 CVE-2014-8916

Original Bulletin: 
   http://www-01.ibm.com/support/docview.wss?uid=swg21963358

- --------------------------BEGIN INCLUDED TEXT--------------------

Security Bulletin: Multiple potential vulnerabilites in IBM OpenPages GRC 
Platform

Security Bulletin

Document information

More support for:

OpenPages GRC Platform

Software version:

6.2, 6.2.1, 7.0, 7.1

Operating system(s):

Platform Independent

Reference #:

1963358

Modified date:

2015-08-31

Summary

The following security vulnerabilities have been identified in versions of IBM
OpenPagesGRC Platform. See Vulnerability Details section for more information.

Vulnerability Details

Customers who have IBM OpenPages GRC platform are potentially impacted by the
following vulnerabilities:

CVEID: CVE-2015-0143

DESCRIPTION: IBM OpenPages GRC Platform could allow an authenticated attacker
to obtain sensitive information from error messages.

CVSS Base Score: 4

CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/100754 for the 
current score

CVSS Environmental Score*: Undefined

CVSS Vector: (AV:N/AC:L/Au:S/C:P/I:N/A:N)

CVEID: CVE-2015-0142

DESCRIPTION: IBM OpenPages GRC Platform could allow an authenticated user to 
turn the server into maintenance mode due to nsufficient access checking for 
System Administration Mode function which would disallow users to save data.

CVSS Base Score: 4

CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/100753 for the 
current score

CVSS Environmental Score*: Undefined

CVSS Vector: (AV:N/AC:L/Au:S/C:P/I:N/A:N)

CVEID: CVE-2015-0141

DESCRIPTION: IBM OpenPages GRC Platform contains insufficient access control 
on JSON requests which could allow an authenticated user to alter user 
filters.

CVSS Base Score: 3.5

CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/100752 for the 
current score

CVSS Environmental Score*: Undefined

CVSS Vector: (AV:N/AC:M/Au:S/C:N/I:P/A:N)

CVEID: CVE-2015-0144

DESCRIPTION: IBM OpenPages GRC Platform is vulnerable to cross-site scripting,
caused by improper validation of user-supplied input. A remote attacker could
exploit this vulnerability using a specially-crafted URL to execute script in
a victim's Web browser within the security context of the hosting Web site, 
once the URL is clicked. An attacker could use this vulnerability to steal the
victim's cookie-based authentication credentials.

CVSS Base Score: 4

CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/100759 for the 
current score

CVSS Environmental Score*: Undefined

CVSS Vector: (AV:N/AC:M/Au:S/C:N/I:P/A:N)

CVEID: CVE-2015-0145

DESCRIPTION: IBM OpenPages GRC Platform is vulnerable to cross-site request 
forgery, caused by improper validation of user-supplied input. By persuading 
an authenticated user to visit a malicious Web site, a remote attacker could 
send a malformed HTTP request. An attacker could exploit this vulnerability to
perform cross-site scripting attacks, Web cache poisoning, and other malicious
activities.

CVSS Base Score: 3.5

CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/100760 for the 
current score

CVSS Environmental Score*: Undefined

CVSS Vector: (AV:N/AC:M/Au:S/C:N/I:P/A:N)

CVEID: CVE-2014-8916

DESCRIPTION: IBM OpenPages GRC Platform is vulnerable to cross-site scripting,
caused by improper validation of user-supplied input. A remote attacker could
exploit this vulnerability using a specially-crafted URL to execute script in
a victim's Web browser within the security context of the hosting Web site, 
once the URL is clicked. An attacker could use this vulnerability to steal the
victim's cookie-based authentication credentials.

CVSS Base Score: 3.5

CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/99302 for the 
current score

CVSS Environmental Score*: Undefined

CVSS Vector: (AV:N/AC:M/Au:S/C:N/I:P/A:N)

Affected Products and Versions

IBM OpenPages with Application Server 6.2 through 7.1

Remediation/Fixes

Fixes have been created to remediate all affected versions of the named 
product. Download and install the fix as soon as practical. The fix and 
installation instructions are available at the URL listed below

Running Version 			Patch Version 	Download URL

IBM OpenPages GRC Platform 7.1 		7.1 FP1 	http://www.ibm.com/support/docview.wss?uid=swg24040169	

IBM OpenPages GRC Platform 7.0 		7.0 FP4 	http://www.ibm.com/support/docview.wss?uid=swg24039998

IBM OpenPages GRC Platform 6.2.1 	6.2.1.1 IF5 	http://www.ibm.com/support/docview.wss?uid=swg24040558

IBM OpenPages GRC Platform 6.2 		6.2 IF7 	http://www.ibm.com/support/docview.wss?uid=swg24040557

Workarounds and Mitigations

No known workaround. Please apply appropriate fix release.

Get Notified about Future Security Bulletins

Subscribe to My Notifications to be notified of important product support 
alerts like this.

References

Complete CVSS v2 Guide

On-line Calculator v2

Related information

IBM Secure Engineering Web Portal

IBM Product Security Incident Response Blog

*The CVSS Environment Score is customer environment specific and will 
ultimately impact the Overall CVSS Score. Customers can evaluate the impact of
this vulnerability in their environments by accessing the links in the 
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the 
Common Vulnerability Scoring System (CVSS) is an "industry open standard 
designed to convey vulnerability severity and help to determine urgency and 
priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY 
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS 
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT 
OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=Irpv
-----END PGP SIGNATURE-----