-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2017.0867
     Security Bulletin: Multiple security vulnerabilities in WebSphere
       Application Server might affect IBM Business Process Manager
                               3 April 2017

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM Business Process Manager Advanced
Publisher:         IBM
Operating System:  AIX
                   Linux variants
                   Solaris
                   Windows
                   z/OS
Impact/Access:     Increased Privileges -- Existing Account
                   Cross-site Scripting -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2017-1151 CVE-2017-1140 CVE-2016-6109

Reference:         ESB-2017.0804
                   ESB-2017.0654
                   ESB-2017.0652

Original Bulletin: 
   http://www.ibm.com/support/docview.wss?uid=swg22000244
   http://www.ibm.com/support/docview.wss?uid=swg21998047
   http://www.ibm.com/support/docview.wss?uid=swg21999133

Comment: This bulletin contains three (3) IBM security advisories.

- --------------------------BEGIN INCLUDED TEXT--------------------

Security Bulletin: A security vulnerability in WebSphere Application Server
might affect IBM Business Process Manager (CVE-2017-1151)

Document information

More support for: IBM Business Process Manager Advanced
Security

Software version: 7.5, 7.5.0.1, 7.5.1, 7.5.1.1, 7.5.1.2, 8.0, 8.0.1, 8.0.1.1,
8.0.1.2, 8.0.1.3, 8.5, 8.5.0.1, 8.5.0.2, 8.5.5, 8.5.6, 8.5.6.1, 8.5.6.2,
8.5.7.CF201606, 8.5.7.CF201609, 8.5.7.CF201612, 8.5.7.CF201703, 8.5.7

Operating system(s): AIX, Linux, Solaris, Windows, z/OS

Reference #: 2000244

Modified date: 31 March 2017

Security Bulletin

Summary

WebSphere Application Server is shipped as a component of IBM Business
Process Manager (BPM). Information about a security vulnerability affecting
IBM WebSphere Application Server Traditional have been published in a
security bulletin.

The affected component is only available in case optional support for
OpenID Connect has been configured.

Vulnerability Details

Please consult the Security Bulletin: Privilege Escalation Vulnerability
in WebSphere Application Server (CVE-2017-1151) for vulnerability details
and information about fixes.

Affected Products and Versions

IBM Business Process Manager V8.0.0.0 through V8.0.1.3

IBM Business Process Manager V8.5.0.0 through V8.5.0.2

IBM Business Process Manager V8.5.5.0

IBM Business Process Manager V8.5.6.0 through V8.5.6.0 CF2

IBM Business Process Manager V8.5.7.0 through V8.5.7.0 Cumulative Fix 2017.03

Note that 8.5.7.0 Cumulative Fix 2017.03 cannot automatically install
interim fixes for the base Application Server. It is important to follow the
complete installation instructions and to manually ensure that recommended
security fixes are installed.

Workarounds and Mitigations

None

Important note

IBM strongly suggests that all System z customers be subscribed to the
System z Security Portal to receive the latest critical System z security
and integrity service. If you are not subscribed, see the instructions
on the System z Security web site. Security and integrity APARs and
associated fixes will be posted to this portal. IBM suggests reviewing
the CVSS scores and applying all security or integrity fixes as soon as
possible to minimize any potential risk.

References
Complete CVSS v3 Guide
On-line Calculator v3

Related information
IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog

Change History

31 March 2017: Original Version Published

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact
of this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency
and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT
WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING
THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

Cross reference information

Segment			Product					Component	Platform			Version
Business Integration	IBM Business Process Manager Express	Security	Linux, Windows			8.5.7.CF201703, 8.5.7.CF201612, 8.5.7.CF201609, 8.5.7.CF201606, 8.5.7, 8.5.6.2, 8.5.6.1, 8.5.6, 8.5.5, 8.5.0.2, 8.5.0.1, 8.5,
														8.0.1.3, 8.0.1.2, 8.0.1.1, 8.0.1, 8.0, 7.5.1.2, 7.5.1.1, 7.5.1, 7.5.0.1, 7.5

Business Integration	IBM Business Process Manager Standard	Security	AIX, Linux, Solaris, Windows	8.5.7.CF201703, 8.5.7.CF201612, 8.5.7.CF201609, 8.5.7.CF201606, 8.5.7, 8.5.6.2, 8.5.6.1, 8.5.6, 8.5.5,	8.5.0.2, 8.5.0.1, 8.5, 
														8.0.1.3, 8.0.1.2, 8.0.1.1, 8.0.1, 8.0, 7.5.1.2,	7.5.1.1, 7.5.1, 7.5.0.1, 7.5

Business Integration	WebSphere Lombardi Edition		Security	AIX, HP-UX, Linux, 		7.2.0.5, 7.2.0.4, 7.2.0.3, 7.2.0.2, 7.2.0.1, 7.2
										Linux zSeries, Linux/x86, 
										Solaris, Windows, Windows 
										Vista, Windows XP	  

Business Integration	WebSphere Process Server				AIX, HP-UX, IBM i, Linux, 	7.0.0.5, 7.0.0.4, 7.0.0.3, 7.0.0.2, 7.0.0.1, 7.0
										Solaris, Windows, z/OS	    

- ---
Security Bulletin: Cross Site Scripting vulnerability in IBM Business
Process Manager (BPM) (CVE-2016-6109)

Document information

More support for: IBM Business Process Manager Advanced
Security

Software version: 7.5, 7.5.0.1, 7.5.1, 7.5.1.1, 7.5.1.2, 8.0, 8.0.1,
8.0.1.1, 8.0.1.2, 8.0.1.3, 8.5, 8.5.0.1, 8.5.0.2, 8.5.5, 8.5.6, 8.5.6.1,
8.5.6.2, 8.5.7.CF201606, 8.5.7.CF201609, 8.5.7.CF201612, 8.5.7

Operating system(s): AIX, Linux, Solaris, Windows

Reference #: 1998047

Modified date: 31 March 2017

Security Bulletin

Summary

IBM BPM is vulnerable to cross-site scripting, caused by improper
neutralization of user-supplied input in some error situations.

Vulnerability Details

CVEID: CVE-2016-6109
DESCRIPTION: IBM Business Process Manager is vulnerable to cross-site
scripting. This vulnerability allows users to embed arbitrary JavaScript
code in the Web UI thus altering the intended functionality potentially
leading to credentials disclosure within a trusted session.
CVSS Base Score: 5.4
CVSS Temporal Score: See
https://exchange.xforce.ibmcloud.com/vulnerabilities/118266 for the
current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N)

Affected Products and Versions

IBM BPM V7.5.0.0 through V7.5.1.2

IBM BPM V8.0.0.0 through V8.0.1.3

IBM BPM V8.5.0.0 through V8.5.0.2

IBM BPM V8.5.5.0

IBM BPM V8.5.6.0 through V8.5.6.0 Cumulative Fix (CF) 2

IBM BPM V8.5.7.0 through V8.5.7.0 CF 2016.12

Remediation/Fixes

The recommended solution is to apply the Interim Fix (iFix) or CF containing
APAR JR56800 as soon as practical:

    IBM Business Process Manager Advanced
    IBM Business Process Manager Standard
    IBM Business Process Manager Express

For IBM BPM V7.5.0.0 through V7.5.1.2:

    Upgrade to minimal Refresh Pack 1, install Fix Pack 2 as required by
    iFix and then apply iFix JR56800

For IBM BPM V8.0.0.0 through V8.0.1.3

    Upgrade to minimal Refresh Pack 1, install Fix Pack 3 as required by
    iFix and then apply iFix JR56800

For IBM BPM V8.5.0.0 through V8.5.0.2

    Install Fix Pack 2 as required by iFix and then apply iFix JR56800

For IBM BPM V8.5.5.0

    Apply iFix JR56800

For IBM BPM V8.5.6.0 through V8.5.6.0 CF2

    Install CF2 as required by iFix and then apply iFix JR56800

For IBM BPM V8.5.7.0 through V8.5.7.0 CF 2016.12

    Install CF 2017.03

Workarounds and Mitigations

None

Important note

IBM strongly suggests that all System z customers be subscribed to the
System z Security Portal to receive the latest critical System z security
and integrity service. If you are not subscribed, see the instructions
on the System z Security web site. Security and integrity APARs and
associated fixes will be posted to this portal. IBM suggests reviewing
the CVSS scores and applying all security or integrity fixes as soon as
possible to minimize any potential risk.

References
Complete CVSS v3 Guide
On-line Calculator v3

Related information
IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog

Change History

31 March 2017: original document published

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact
of this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency
and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT
WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING
THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

Cross reference information 
Segment			Product					Component	Platform			Version		
Business Integration	IBM Business Process Manager Express	Security	Linux, Windows			8.5.7.CF201612, 8.5.7.CF201609, 8.5.7.CF201606, 8.5.7, 8.5.6.2, 8.5.6.1, 8.5.6, 8.5.5, 8.5.0.2, 8.5.0.1, 8.5, 8.0.1.3, 8.0.1.2,
														8.0.1.1, 8.0.1, 8.0, 7.5.1.2, 7.5.1.1, 7.5.1, 7.5.0.1, 7.5
Business Integration	IBM Business Process Manager Standard	Security 	AIX, Linux, Solaris, Windows	8.5.7.CF201612, 8.5.7.CF201609, 8.5.7.CF201606, 8.5.7, 8.5.6.2, 8.5.6.1, 8.5.6, 8.5.5, 8.5.0.2, 8.5.0.1, 8.5, 8.0.1.3, 8.0.1.2,
														8.0.1.1, 8.0.1, 8.0, 7.5.1.2, 7.5.1.1, 7.5.1, 7.5.0.1, 7.5
Business Integration	IBM Business Process Manager Advanced			AIX, Linux, Solaris, Windows,   8.5.7.CF201612, 8.5.7.CF201609, 8.5.7.CF201606, 8.5.7, 8.5.6.2, 8.5.6.1, 8.5.6, 8.5.5, 8.5.0.2, 8.5.0.1, 8.5, 8.0.1.3, 8.0.1.2,
										z/OS				8.0.1.1, 8.0.1, 8.0, 7.5.1.2, 7.5.1.1, 7.5.1, 7.5.0.1, 7.5

- ---
Security Bulletin: Persistent cross-site scripting vulnerability in IBM
Business Process Manager (CVE-2017-1140)

Document information

More support for: IBM Business Process Manager Advanced
Security

Software version: 8.0, 8.0.1, 8.0.1.1, 8.0.1.2, 8.0.1.3, 8.5, 8.5.0.1,
8.5.0.2, 8.5.5, 8.5.6, 8.5.6.1, 8.5.6.2, 8.5.7.CF201606, 8.5.7.CF201609,
8.5.7.CF201612, 8.5.7

Operating system(s): AIX, Linux, Solaris, Windows

Reference #: 1999133

Modified date: 31 March 2017

Security Bulletin

Summary

IBM Business Proccess Manager is vulnerable to persistent cross-site
scripting, caused by improper neutralization of user-supplied input.

Vulnerability Details

CVEID: CVE-2017-1140
DESCRIPTION: IBM Business Process Manager is vulnerable to cross-site
scripting. This vulnerability allows users to embed arbitrary JavaScript
code in the Web UI thus altering the intended functionality potentially
leading to credentials disclosure within a trusted session.
CVSS Base Score: 5.4
CVSS Temporal Score: See
https://exchange.xforce.ibmcloud.com/vulnerabilities/121905 for the
current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N)

Affected Products and Versions

IBM Business Process Manager V8.0.0.0 through V8.0.1.3

IBM Business Process Manager V8.5.0.0 through V8.5.0.2

IBM Business Process Manager V8.5.5.0

IBM Business Process Manager V8.5.6.0 through V8.5.6.0 CF2

IBM Business Process Manager V8.5.7.0 through V8.5.7.0 Cumulative Fix 2016.12

Remediation/Fixes

The recommended solution is to apply the Interim Fix (iFix) or CF containing
APAR JR57397 as soon as practical:

    IBM Business Process Manager Advanced
    IBM Business Process Manager Standard
    IBM Business Process Manager Express

For IBM BPM V8.0.0.0 through V8.0.1.3

    Upgrade to minimal Refresh Pack 1, install Fix Pack 3 as required by
    iFix and then apply iFix JR57397


For IBM BPM V8.5.0.0 through V8.5.0.2

    Install Fix Pack 2 as required by iFix and then apply iFix JR57397


For IBM BPM V8.5.5.0

    Apply iFix JR57397


For IBM BPM V8.5.6.0 through V8.5.6.0 CF2

    Install CF2 as required by iFix and then apply iFix JR57397


For IBM BPM V8.5.7.0 through V8.5.7.0 CF 2016.12

    Install CF 2017.03

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

Subscribe to My Notifications to be notified of important product support
alerts like this.

Important note

IBM strongly suggests that all System z customers be subscribed to the
System z Security Portal to receive the latest critical System z security
and integrity service. If you are not subscribed, see the instructions
on the System z Security web site. Security and integrity APARs and
associated fixes will be posted to this portal. IBM suggests reviewing
the CVSS scores and applying all security or integrity fixes as soon as
possible to minimize any potential risk.

References
Complete CVSS v3 Guide
On-line Calculator v3

Related information
IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog

Change History

31 March 2017: original document published

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact
of this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency
and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT
WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING
THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.


Cross reference information

Segment			Product					Component		Platform			Version

Business Integration	IBM Business Process Manager Express	Security 		Linux, Windows			8.5.7.CF201612, 8.5.7.CF201609, 8.5.7.CF201606, 8.5.7, 8.5.6.2, 8.5.6.1, 8.5.6, 8.5.5, 8.5.0.2, 8.5.0.1, 8.5, 8.0.1.3, 8.0.1.2,	
															8.0.1.1, 8.0.1, 8.0
Business Integration	IBM Business Process Manager Standard	Security		AIX, Linux, Solaris, Windows	8.5.7.CF201612, 8.5.7.CF201609, 8.5.7.CF201606, 8.5.7, 8.5.6.2, 8.5.6.1, 8.5.6, 8.5.5, 8.5.0.2, 8.5.0.1, 8.5, 8.0.1.3, 8.0.1.2, 
															8.0.1.1, 8.0.1, 8.0
Business Integration	IBM Business Process Manager Advanced				AIX, Linux, Solaris, Windows,   8.5.7.CF201612, 8.5.7.CF201609, 8.5.7.CF201606, 8.5.7, 8.5.6.2, 8.5.6.1, 8.5.6, 8.5.5, 8.5.0.2, 8.5.0.1, 8.5, 8.0.1.3, 8.0.1.2,
											z/OS				8.0.1.1, 8.0.1, 8.0

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=jQkQ
-----END PGP SIGNATURE-----