-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2017.1540
   Security Bulletin: Vulnerability in IBM Websphere Application Server
         affects IBM Emptoris Strategic Supply Management and IBM
          Emptoris Services Procurement products (CVE-2017-1137)
                               20 June 2017

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM Emptoris Strategic Supply Management
Publisher:         IBM
Operating System:  Network Appliance
Impact/Access:     Access Confidential Data -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2017-1137  

Reference:         ESB-2017.1473
                   ESB-2017.1425
                   ESB-2017.1129
                   ESB-2017.1119

Original Bulletin: 
   http://www.ibm.com/support/docview.wss?uid=swg22004666

- --------------------------BEGIN INCLUDED TEXT--------------------

Security Bulletin: Vulnerability in IBM Websphere Application Server
affects IBM Emptoris Strategic Supply Management and IBM Emptoris Services
Procurement products (CVE-2017-1137)

Document information

More support for: Emptoris Strategic Supply Management
Platform

Software version: Version Independent

Operating system(s): Platform Independent

Reference #: 2004666

Modified date: 19 June 2017

Security Bulletin

Summary

The IBM Emptoris Strategic Supply Management Suite and IBM Emptoris Services
Procurement products are affected by a vulnerability that exists in the
IBM Websphere Application Server. The security bulletin includes issues
disclosed as part of the IBM Websphere Application Server updates.
The IBM Emptoris Strategic Supply Management Suite of products which are
affected with this vulnerability include IBM Emptoris Contract Management,
IBM Emptoris Sourcing, IBM Emptoris Spend Analysis and IBM Emptoris
Program Management.

Vulnerability Details

CVEID: CVE-2017-1137
DESCRIPTION: IBM WebSphere Application Server could provide weaker than
expected security. A remote attacker could exploit this weakness to obtain
sensitive information and gain unauthorized access to the admin console.
CVSS Base Score: 5.9
CVSS Temporal Score: See
https://exchange.xforce.ibmcloud.com/vulnerabilities/121549 for the
current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)

Affected Products and Versions

IBM Emptoris Contract Management 9.5 through 10.1.x
IBM Emptoris Program Management 10.0.0 through 10.1.x
IBM Emptoris Sourcing 10.0.0 through 10.1.x
IBM Emptoris Spend Analysis 10.0.0 through 10.1.x
IBM Emptoris Services Procurement 10.x

Remediation/Fixes

An interim fix has been issued for the IBM WebSphere Application Server
(WAS) which is not susceptible to this vulnerability. Customers running any
of the IBM Emptoris products listed below should apply the interim fix to
all IBM WebSphere Application Server installations that are used to run
IBM Emptoris applications. Please refer to Security Bulletin: Potential
security vulnerability in WebSphere Application Server Administrative
Console (CVE-2017-1137) for details.

Select the appropriate WebSphere Application Server fix based on the version
being used for IBM Emptoris product version. The following table lists the
IBM Emptoris application versions along with the corresponding required
version of IBM WebSphere Application Server and a link to the corresponding
fix version where further installation instructions are provided.

Emptoris Product Version	WAS Version			Interim Fix
9.5.x.x				8.0.0.0 through 8.0.0.12.	Not affected
				8.0.0.13			? Apply Interim Fix PI76088

10.0.0.x, 10.0.1.x		8.5.0.x				Not affected
10.0.2.x , 10.0.4, 10.1.x	8.5.0.0 through 8.5.5.8		Not affected
				8.5.5.9 through 8.5.5.11	? Apply Interim Fix PI76088

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

Subscribe to My Notifications to be notified of important product support
alerts like this.

References
Complete CVSS v3 Guide
On-line Calculator v3

Related information
IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact
of this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency
and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT
WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING
THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

Cross reference information

Segment		Product				Component	Platform	Version	Edition
Commerce	Emptoris Contract Management
Commerce	Emptoris Program Management
Commerce	Emptoris Services Procurement
Commerce	Emptoris Sourcing
Commerce	Emptoris Spend Analysis

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBWUi114x+lLeg9Ub1AQh8pRAAqNHBN9czWZYKkJZ2/TUtT8FuaHziEI2B
U8Qg9otru/UabqwHhVODzmiOBax+mb98zjBpy7PEHF5R52370leyaxI7ieoasdgY
a4em7p5zqwWNFxI5IlJ60qiCxfeWijg/Nc9xCnv/oYYxz5Msa86KSxu6sbWDmSjR
f3gHgzFP3nIzifGd7D9uWfHEpKHOhcen+vwbnKpiy01EZXaARaOMW08iOe1XAEXj
jmvu5OSU0IY+4RdVZPg1Fo0iNmDLFBVp4Jl85maDuERfakyG0PkPTyG3mRgjaeZm
tvR880vN16okcW9IJzzUHTr6LO91Hh4cYziWK33zByE1VyD5VeTQh54F9nKyaUVB
p2yMP+imR9NUhUGjg0sTmD8c5PiQiQTg9BywC5QWv/EZ57d9KmrNJyNiyTghGOTp
X9zcaODvKv8i/3gAZS8kJdUO2AoEjfd9DULRrRnQkTKEyX344+Y09hO7IHMIZmaf
6FI99erLxzsAzA1DmVrmwEBjzd6fQpje2FjV3VHmK/CNxMAvth+OJcGzd8OhNaEa
IC76BqT45mF/Qj4nrrDgNn1BKelGh7SyCjJv7oL8jVSYQC8/y0pfvXznS0CTI6Nr
etCX4tw6N4T3gKvbbWtTjsdCWTkkP1+JEQ2ZS78JlX6VpNPdCPp0cfikQCCPucZX
dTLkRah30yE=
=OnhJ
-----END PGP SIGNATURE-----