-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2019.4587
        Security Bulletin: IBM Planning Analytics Local is affected
                        by security vulnerabilities
                              9 December 2019

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM Planning Analytics
Publisher:         IBM
Operating System:  Windows
                   UNIX variants (UNIX, Linux, OSX)
Impact/Access:     Cross-site Scripting -- Remote with User Interaction
                   Unauthorised Access  -- Remote/Unauthenticated      
Resolution:        Patch/Upgrade
CVE Names:         CVE-2019-4612 CVE-2019-4611 

Original Bulletin: 
   https://www.ibm.com/support/pages/node/1118565

- --------------------------BEGIN INCLUDED TEXT--------------------

IBM Planning Analytics Local  is affected by security vulnerabilities

Security Bulletin

Summary

The Planning Analytics Workspace component of IBM Planning Analytics is
affected by security vulnerabilities. These vulnerabilities have been addressed
in IBM Planning Analytics Local v2.0 - Planning Analytics Workspace Release 47.

Vulnerability Details

CVEID: CVE-2019-4612
DESCRIPTION: IBM Planning Analytics Workspace is vulnerable to malicious file
upload in the My Account Portal. Attackers can make use of this weakness and
upload malicious executable files into the system and it can be sent to victim
for performing further attacks.
CVSS Base score: 6.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
168523 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:N)

CVEID: CVE-2019-4611
DESCRIPTION: IBM Planning Analytics is vulnerable to cross-site scripting. This
vulnerability allows users to embed arbitrary JavaScript code in the Web UI
thus altering the intended functionality potentially leading to credentials
disclosure within a trusted session.
CVSS Base score: 5.4
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
168519 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N)

Affected Products and Versions

+------------------------+------------+
| Affected Product(s)    | Version(s) |
+------------------------+------------+
| IBM Planning Analytics | 2.0        |
+------------------------+------------+

Remediation/Fixes

The recommended solution is to apply the fix as soon as practical.

Download IBM Planning Analytics Local v2.0 - Planning Analytics Workspace
Release 47 from Fix Central.

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

References

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=An/l
-----END PGP SIGNATURE-----