-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2019.2335
 Cross-site scripting vulnerabilities affects IBM License Metric Tool v9.x
               and IBM BigFix Inventory v9.x (CVE-2019-4368)
                               28 June 2019

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM License Metric Tool
Publisher:         IBM
Operating System:  AIX
                   HP-UX
                   Linux variants
                   Solaris
                   Windows
Impact/Access:     Cross-site Scripting -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2019-4368  

Original Bulletin: 
   http://www.ibm.com/support/docview.wss?uid=ibm10881400

- --------------------------BEGIN INCLUDED TEXT--------------------

Cross-site scripting vulnerabilities affects IBM License Metric Tool v9.x and
IBM BigFix Inventory v9.x (CVE-2019-4368)

Product:             IBM License Metric Tool
Software version:    9.2
Operating system(s): Platform Independent
Reference #:         0881400

Security Bulletin

Summary

IBM License Metric Tool and IBM BigFix Inventory is vulnerable to cross-site
scripting, caused by improper neutralization of user-supplied input in some
situations.
That vulnerability allows users to embed arbitrary JavaScript code in some of
the Web UI forms thus altering the intended functionality and allowing spoofing
attacks.

Vulnerability Details

CVEID: CVE-2019-4368
DESCRIPTION: IBM License Metric Tool and IBM BigFix Inventory is vulnerable to
cross-site scripting, caused by improper neutralization of user-supplied input
in some situations. An attacker could exploit this vulnerability to obtain
sensitive information.
CVSS Base Score: 5.4
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/
118855 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N)

Affected Products and Versions

IBM License Metric Tool v9.x
IBM BigFix Inventory v9.x

Remediation/Fixes

Upgrade to version 9.2.15or later using the following procedure:

  o In IBM Endpoint Manager console, expand IBM BigFix Inventory or IBM License
    Reporting (ILMT) node under Sites node in the tree panel.
  o Click Fixlets and Tasks node. Fixlets and Tasks panel will be displayed on
    the right.
  o In the Fixlets and Tasks panel locate Upgrade to the latest version of IBM
    BigFix Inventory 9.x or Upgrade to the latest version of IBM License Metric
    Tool 9.x fixlet and run it against the computer that hosts your server.

Workarounds and Mitigations

None

Change History

16th April 2019 : Original version published

                    Cross reference information
      Product        Component       Platform       Version Edition
IBM BigFix Inventory           Platform Independent 9.2

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBXRVc9maOgq3Tt24GAQjQkA//aL5I92HghtKBlST9bvk1daTRQ/apkLcM
Vq9BeSBYtDs4ZmLPStES+UB6lHzxp6q/B2nmNgwfc+fe4nY4QrNi9u4mN7PV2AFp
cFX8XBNS5m2yxqLaTA4tLRLiVN0i3tAhlZ6xNLjbAswTcXByRbFfT3wCNj6IoFxZ
VBpTErm7DyK9JMMS3eagiSYnSlHNmzvs5gl8zDm2aEz5gfQWR7FX8u+kUkL6eHHj
4GezwNXaueW1FQuvk5RX+VbVVcA2IJr9yBJzg/z9dWGbQ6vvF9QsZ0xnJWZaAXu+
xISeu3ZwPasNaO2YEeBHJ7xcQfY8prW7gyhKdB8FNsncaGwZnBui9LvQJ2QlDGQx
/PGe/Pt3YZQRQTLNmU2oGKTFlQFQctWpc0kCf2tJszewqkOFHx5PgH8OL+5vC1IA
PRBkXWpjBqVTombxapUdHnKa4p/DdrycJC7+7AsWewknH/mmwdy4I50UyS8qsSbO
/ULxnabLg+jDmsvGxMXK1OwNQoO9GseVcj5Dm+0EOI+hByy6+PV4nm4WYdAoNFX5
CmhkbXXKkUzbYrUpMbI4rBFu/mgYkQe82T0Ryv20BBMER97m5Y/Kns5xbfyL9NlA
zV2KMVt73kSaPX/tywpj419paEx+hKuDGAMdTSnjXghKkD7r24qCIUzkbZAd2b5b
KvNk5cVYz+k=
=whR6
-----END PGP SIGNATURE-----