-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2019.1030
         Content Collector for Email is affected by 3RD PARTY IBM
               WebSphere Application Server Deserialization
                               28 March 2019

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM Content Collector
Publisher:         IBM
Operating System:  AIX
                   Windows
                   Linux variants
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated
                   Read-only Data Access           -- Existing Account      
Resolution:        Patch/Upgrade
CVE Names:         CVE-2018-1904 CVE-2018-1770 

Reference:         ESB-2019.0727
                   ESB-2019.0371
                   ESB-2019.0286
                   ESB-2019.0240
                   ESB-2019.0238
                   ESB-2019.0372.2

Original Bulletin: 
   http://www.ibm.com/support/docview.wss?uid=ibm10791975
   http://www.ibm.com/support/docview.wss?uid=ibm10740597

Comment: This bulletin contains two (2) advisories.

- --------------------------BEGIN INCLUDED TEXT--------------------

Content Collector for Email is affected by 3RD PARTY IBM WebSphere Application
Server Deserialization

Product:             Content Collector

Component:           Content Collector for Email

Software version:    4.0.1

Operating system(s): AIX, Linux, Windows

Reference #:         0791975

Security Bulletin

Summary

Content Collector for Email has addressed the following vulnerability. IBM
WebSphere Application Server could allow remote attackers to execute arbitrary
Java code through an administrative client class with a serialized object from
untrusted sources.

Vulnerability Details

CVEID: CVE-2018-1904
DESCRIPTION: IBM WebSphere Application Server could allow remote attackers to
execute arbitrary Java code through an administrative client class with a
serialized object from untrusted sources.
CVSS Base Score: 8.1
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
152533 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)

Affected Products and Versions

Content Collector for Email v4.0.1

Remediation/Fixes

+----------------------------------------------+------+--------------------------------------------------------------------------------------+
|Product                                       |VRM   |Remediation                                                                           |
+----------------------------------------------+------+--------------------------------------------------------------------------------------+
|Content Collector for Email                   |4.0.1 |Use Content Collector for Email 4.0.1.8 Interim Fix 009                               |
+----------------------------------------------+------+--------------------------------------------------------------------------------------+

Workarounds and Mitigations

NA

Reference

Complete CVSS v3 Guide
On-line Calculator v3

Related Information

IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog

Change History

06 February 2019: Original version published

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact of
this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency and
priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF
ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

- ------------------------------------------------------------------------------

Content Collector for Email is affected by 3RD PARTY CSRF and OOB-XXE
Vulnerabilities in WebSphere Web Application Server's Integrated Solutions
Console 9.0.0.8, 8.5.5.13, and 8.5.5.9

Product:             Content Collector

Component:           Content Collector for Email

Software version:    4.0.1

Operating system(s): AIX, Linux, Windows

Reference #:         0740597

Security Bulletin

Summary

Content Collector for Email has addressed the following vulnerability. IBM
WebSphere Application Server could allow a remote attacker to traverse
directories on the system. An attacker could send a specially-crafted URL
request containing "dot dot" sequences (/../) to view arbitrary files on the
system.

Vulnerability Details

CVEID: CVE-2018-1770
DESCRIPTION: IBM WebSphere Application Server could allow a remote attacker to
traverse directories on the system. An attacker could send a specially-crafted
URL request containing "dot dot" sequences (/../) to view arbitrary files on
the system.
CVSS Base Score: 6.5
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
148686 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)

Affected Products and Versions

Content Collector for Email v4.0.1

Remediation/Fixes

+----------------------------------------------+------+--------------------------------------------------------------------------------------+
|Product                                       |VRM   |Remediation                                                                           |
+----------------------------------------------+------+--------------------------------------------------------------------------------------+
|Content Collector for Email                   |4.0.1 |Use Content Collector for Email 4.0.1.8 Interim Fix 009                               |
+----------------------------------------------+------+--------------------------------------------------------------------------------------+

Workarounds and Mitigations

NA

Reference

Complete CVSS v3 Guide
On-line Calculator v3

Related Information

IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog

Change History

February 06, 2019 Original Version Published

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact of
this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency and
priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF
ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=blTG
-----END PGP SIGNATURE-----