-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2019.4596
    Multiple Vulnerabilities found in IBM WebSphere Application Server
                             10 December 2019

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM WebSphere Application Server
Publisher:         IBM
Operating System:  AIX
                   UNIX variants (UNIX, Linux, OSX)
                   Solaris
                   Windows
Impact/Access:     Increased Privileges           -- Existing Account            
                   Denial of Service              -- Remote/Unauthenticated      
                   Cross-site Scripting           -- Remote with User Interaction
                   Provide Misleading Information -- Remote/Unauthenticated      
                   Access Confidential Data       -- Remote/Unauthenticated      
Resolution:        Patch/Upgrade
CVE Names:         CVE-2019-17631 CVE-2019-12402 CVE-2019-10098
                   CVE-2019-10092 CVE-2019-10086 CVE-2019-9518
                   CVE-2019-9517 CVE-2019-9515 CVE-2019-9514
                   CVE-2019-9513 CVE-2019-9512 CVE-2019-4663
                   CVE-2019-4505 CVE-2019-4477 CVE-2019-4442
                   CVE-2019-4441 CVE-2019-4305 CVE-2019-4304
                   CVE-2019-4271 CVE-2019-4270 CVE-2019-4268
                   CVE-2019-2999 CVE-2019-2996 CVE-2019-2992
                   CVE-2019-2989 CVE-2019-2988 CVE-2019-2987
                   CVE-2019-2983 CVE-2019-2981 CVE-2019-2978
                   CVE-2019-2977 CVE-2019-2975 CVE-2019-2973
                   CVE-2019-2964 CVE-2019-2962 CVE-2019-2958
                   CVE-2019-2945 CVE-2019-2933 CVE-2019-2894
                   CVE-2018-20843 CVE-2014-3603 

Reference:         ASB-2019.0294
                   ASB-2019.0290
                   ASB-2019.0286
                   ASB-2019.0270
                   ASB-2019.0238

Original Bulletin: 
   https://www.ibm.com/support/pages/node/1125219
   https://www.ibm.com/support/pages/node/1126887
   https://www.ibm.com/support/pages/node/1127367
   https://www.ibm.com/support/pages/node/1127397

Comment: This bulletin contains four (4) security advisories.

- --------------------------BEGIN INCLUDED TEXT--------------------

Security Bulletin: A security vulnerability has been identified in IBM
WebSphere Application Server which is used by IBM Rational ClearQuest
(CVE-2019-10086)

Summary

IBM WebSphere Application Server (WAS) is used by the IBM Rational ClearQuest
server and web components. Information about a security vulnerability
affecting WAS has been published in a security bulletin.

Vulnerability Details

Refer to the security bulletin(s) listed in the Remediation/Fixes section.

Affected Products and Versions

IBM Rational ClearQuest, ClearQuest CM Server component.

Versions 8.0.0.x, 8.0.1.x, 9.0.0.x, 9.0.1.x:

This vulnerability only applies to the server component, and only for certain
levels of WebSphere Application Server.

Remediation/Fixes

Refer to the following security bulletin for vulnerability details and
information about fixes addressed by IBM WebSphere Application Server (WAS),
which is shipped with IBM Rational ClearQuest.

+-----------------------------------+-----------------------------------+----------------------------------------------------------------------+
|Principal Product and Version(s)   |Affected Supporting Product and    |Affected Supporting Product Security Bulletin                         |
|                                   |Version                            |                                                                      |
+-----------------------------------+-----------------------------------+----------------------------------------------------------------------+
|IBM Rational ClearQuest, versions  |IBM WebSphere Application Server   |Security Bulletin: WebSphere Application Server is vulnerable to      |
|8.0.0.x, 8.0.1.x, 9.0.0.x, 9.0.1.x |version 7.0, 8.0, 8.5, and 9.0.    |Apache Commons Beanutils (CVE-2019-10086)                             |
+-----------------------------------+-----------------------------------+----------------------------------------------------------------------+
+-------------------+--------------------------------------------------------+
|ClearQuest Versions|                    Applying the fix                    |
+-------------------+--------------------------------------------------------+
|8.0.0.x            | 1. Determine the WAS version used by your CM server.   |
|8.0.1.x            |    Navigate to the CM profile directory (either the    |
|9.0.0.x            |    profile you specified when installing ClearQuest, or|
|9.0.1.x            |    <clearquest-home>/cqweb/cqwebprofile), then execute |
|                   |    the script: bin/versionInfo.sh (UNIX) or bin\       |
|                   |    versionInfo.bat (Windows). The output includes a    |
|                   |    section "IBM WebSphere Application Server". Make    |
|                   |    note of the version listed in this section.         |
|                   | 2. Identify the latest available fix (per the bulletin |
|                   |    listed above) for the version of WAS used for CM    |
|                   |    server.                                             |
|                   | 3. Apply the appropriate WebSphere Application Server  |
|                   |    fix directly to your CM server host. No             |
|                   |    ClearQuest-specific steps are necessary.            |
+-------------------+--------------------------------------------------------+

For 8.0.x, 7.0.x, 7.1.x and earlier releases, IBM recommends upgrading to a
fixed, supported version/release/platform of the product.

Workarounds and Mitigations

None.

Change History

10 December 2019: Original version published

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the impact of
this vulnerability in their environments by accessing the links in the
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the
Common Vulnerability Scoring System (CVSS) is an "industry open standard
designed to convey vulnerability severity and help to determine urgency and
priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT
OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

- --------------------------------------------------------------------------------

Multiple Security Vulnerabilities Affect IBM WebSphere Application Server in
IBM Cloud

Security Bulletin

Summary

There are multiple security vulnerabilities that affect the IBM WebSphere
Application Server in the IBM Cloud. There is a file traversal vulnerability in
the Admin Console of WebSphere Application Server. There is a path traversal
vulnerability in the Admin Console of WebSphere Application Server. There is a
Client-side HTTP parameter pollution vulnerability and a Cross-site scripting
vulnerability in WebSphere Application Server Admin Console. There is an
information disclosure in WebSphere Application Server when using Security
Auditing. There are multiple vulnerabilities in the IBM HTTP Server used by
WebSphere Application Server. There is an information disclosure in WebSphere
Application Server ND. There is an information disclosure and a bypass security
vulnerability in WebSphere Application Server Liberty. There is a potential
information disclosure vulnerability in IBM WebSphere Application Server. There
are multiple vulnerabilities in the HTTP/2 implementation that is used by
WebSphere Application Server Liberty. This affects the servlet-4.0 and
servlet-3.1 features. There is a potential denial of service in the Admin
Console of WebSphere Application Server. There is a denial of service
vulnerability in WebSphere Application Server Liberty. There is a man in the
middle vulnerability in WebSphere Application Server Liberty. There are
multiple vulnerabilities in the IBM SDK Java Technology Edition that is shipped
with IBM WebSphere Application Server.

Vulnerability Details

CVEID: CVE-2018-20843
DESCRIPTION: In libexpat in Expat before 2.2.7, XML input including XML names
that contain a large number of colons could make the XML parser consume a high
amount of RAM and CPU resources while processing (enough to be usable for
denial-of-service attacks).
CVSS Base score: 3.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
163073 for the current score.
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)

CVEID: CVE-2019-4270
DESCRIPTION: IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 Admin
Console is vulnerable to cross-site scripting. This vulnerability allows users
to embed arbitrary JavaScript code in the Web UI thus altering the intended
functionality potentially leading to credentials disclosure within a trusted
session. IBM X-Force ID: 160203.
CVSS Base score: 5.4
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
160203 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N)

CVEID: CVE-2019-9515
DESCRIPTION: Some HTTP/2 implementations are vulnerable to a settings flood,
potentially leading to a denial of service. The attacker sends a stream of
SETTINGS frames to the peer. Since the RFC requires that the peer reply with
one acknowledgement per SETTINGS frame, an empty SETTINGS frame is almost
equivalent in behavior to a ping. Depending on how efficiently this data is
queued, this can consume excess CPU, memory, or both.
CVSS Base score: 7.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
165181 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID: CVE-2019-9518
DESCRIPTION: Some HTTP/2 implementations are vulnerable to a flood of empty
frames, potentially leading to a denial of service. The attacker sends a stream
of frames with an empty payload and without the end-of-stream flag. These
frames can be DATA, HEADERS, CONTINUATION and/or PUSH_PROMISE. The peer spends
time processing each frame disproportionate to attack bandwidth. This can
consume excess CPU.
CVSS Base score: 7.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
164904 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID: CVE-2019-9517
DESCRIPTION: Some HTTP/2 implementations are vulnerable to unconstrained
interal data buffering, potentially leading to a denial of service. The
attacker opens the HTTP/2 window so the peer can send without constraint;
however, they leave the TCP window closed so the peer cannot actually write
(many of) the bytes on the wire. The attacker then sends a stream of requests
for a large response object. Depending on how the servers queue the responses,
this can consume excess memory, CPU, or both.
CVSS Base score: 7.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
165183 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID: CVE-2019-9512
DESCRIPTION: Some HTTP/2 implementations are vulnerable to ping floods,
potentially leading to a denial of service. The attacker sends continual pings
to an HTTP/2 peer, causing the peer to build an internal queue of responses.
Depending on how efficiently this data is queued, this can consume excess CPU,
memory, or both.
CVSS Base score: 7.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
164903 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID: CVE-2019-9514
DESCRIPTION: Some HTTP/2 implementations are vulnerable to a reset flood,
potentially leading to a denial of service. The attacker opens a number of
streams and sends an invalid request over each stream that should solicit a
stream of RST_STREAM frames from the peer. Depending on how the peer queues the
RST_STREAM frames, this can consume excess memory, CPU, or both.
CVSS Base score: 7.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
164640 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID: CVE-2019-9513
DESCRIPTION: Some HTTP/2 implementations are vulnerable to resource loops,
potentially leading to a denial of service. The attacker creates multiple
request streams and continually shuffles the priority of the streams in a way
that causes substantial churn to the priority tree. This can consume excess
CPU.
CVSS Base score: 7.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
164639 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID: CVE-2019-4477
DESCRIPTION: IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 could
allow a user with access to audit logs to obtain sensitive information, caused
by improper handling of command line options. IBM X-Force ID: 163997.
CVSS Base score: 5.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
163997 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N)

CVEID: CVE-2019-2989
DESCRIPTION: An unspecified vulnerability in Java SE could allow an
unauthenticated attacker to cause no confidentiality impact, high integrity
impact, and no availability impact.
CVSS Base score: 6.8
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
169295 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N)

CVEID: CVE-2019-2958
DESCRIPTION: An unspecified vulnerability in Java SE related to the Libraries
component could allow an unauthenticated attacker to cause no confidentiality
impact, high integrity impact, and no availability impact.
CVSS Base score: 5.9
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
169264 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N)

CVEID: CVE-2019-2977
DESCRIPTION: An unspecified vulnerability in Java SE related to the VM
component could allow an unauthenticated attacker to cause low confidentiality
impact, no integrity impact, and low availability impact.
CVSS Base score: 4.8
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
169283 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L)

CVEID: CVE-2019-2975
DESCRIPTION: An unspecified vulnerability in Java SE related to the Scripting
component could allow an unauthenticated attacker to cause no confidentiality
impact, low integrity impact, and low availability impact.
CVSS Base score: 4.8
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
169281 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L)

CVEID: CVE-2019-2999
DESCRIPTION: An unspecified vulnerability in Java SE related to the Javadoc
component could allow an unauthenticated attacker to cause low confidentiality
impact, low integrity impact, and no availability impact.
CVSS Base score: 4.7
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
169305 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N)

CVEID: CVE-2019-2996
DESCRIPTION: An unspecified vulnerability in Java SE related to the Deployment
component could allow an unauthenticated attacker to cause low confidentiality
impact, low integrity impact, and no availability impact.
CVSS Base score: 4.2
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
169302 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N)

CVEID: CVE-2019-2894
DESCRIPTION: An unspecified vulnerability in Java SE related to the Security
component could allow an unauthenticated attacker to obtain sensitive
information resulting in a low confidentiality impact using unknown attack
vectors.
CVSS Base score: 3.7
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
169207 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N)

CVEID: CVE-2019-2992
DESCRIPTION: An unspecified vulnerability in Java SE related to the 2D
component could allow an unauthenticated attacker to cause a denial of service
resulting in a low availability impact using unknown attack vectors.
CVSS Base score: 3.7
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
169298 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)

CVEID: CVE-2019-2988
DESCRIPTION: An unspecified vulnerability in Java SE related to the 2D
component could allow an unauthenticated attacker to cause a denial of service
resulting in a low availability impact using unknown attack vectors.
CVSS Base score: 3.7
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
169294 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)

CVEID: CVE-2019-2987
DESCRIPTION: An unspecified vulnerability in Java SE related to the 2D
component could allow an unauthenticated attacker to cause a denial of service
resulting in a low availability impact using unknown attack vectors.
CVSS Base score: 3.7
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
169293 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)

CVEID: CVE-2019-2983
DESCRIPTION: An unspecified vulnerability in Java SE related to the
Serialization component could allow an unauthenticated attacker to cause a
denial of service resulting in a low availability impact using unknown attack
vectors.
CVSS Base score: 3.7
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
169289 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)

CVEID: CVE-2019-2981
DESCRIPTION: An unspecified vulnerability in Java SE related to the JAXP
component could allow an unauthenticated attacker to cause a denial of service
resulting in a low availability impact using unknown attack vectors.
CVSS Base score: 3.7
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
169287 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)

CVEID: CVE-2019-2978
DESCRIPTION: An unspecified vulnerability in Java SE related to the Networking
component could allow an unauthenticated attacker to cause a denial of service
resulting in a low availability impact using unknown attack vectors.
CVSS Base score: 3.7
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
169284 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)

CVEID: CVE-2019-2973
DESCRIPTION: An unspecified vulnerability in Java SE related to the JAXP
component could allow an unauthenticated attacker to cause a denial of service
resulting in a low availability impact using unknown attack vectors.
CVSS Base score: 3.7
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
169279 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)

CVEID: CVE-2019-2962
DESCRIPTION: An unspecified vulnerability in Java SE related to the 2D
component could allow an unauthenticated attacker to cause a denial of service
resulting in a low availability impact using unknown attack vectors.
CVSS Base score: 3.7
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
169268 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)

CVEID: CVE-2019-2964
DESCRIPTION: An unspecified vulnerability in Java SE related to the Concurrency
component could allow an unauthenticated attacker to cause a denial of service
resulting in a low availability impact using unknown attack vectors.
CVSS Base score: 3.7
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
169270 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)

CVEID: CVE-2019-2945
DESCRIPTION: An unspecified vulnerability in Java SE related to the Networking
component could allow an unauthenticated attacker to cause a denial of service
resulting in a low availability impact using unknown attack vectors.
CVSS Base score: 3.1
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
169250 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L)

CVEID: CVE-2019-2933
DESCRIPTION: An unspecified vulnerability in Java SE related to the Libraries
component could allow an unauthenticated attacker to obtain sensitive
information resulting in a low confidentiality impact using unknown attack
vectors.
CVSS Base score: 3.1
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
169238 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N)

CVEID: CVE-2019-17631
DESCRIPTION: Eclipse OpenJ9 could allow a local attacker to gain elevated
privileges on the system, caused by the failure to performs an authorization
check when an actor attempts to access a resource or perform an action. An
attacker could exploit this vulnerability to gain access to diagnostic
operations such as causing a GC or creating a diagnostic file.
CVSS Base score: 8.4
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
169513 for the current score.
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)

CVEID: CVE-2019-4271
DESCRIPTION: IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 Admin
console is vulnerable to a Client-side HTTP parameter pollution vulnerability.
IBM X-Force ID: 160243.
CVSS Base score: 3.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
160243 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N)

CVEID: CVE-2019-4441
DESCRIPTION: IBM WebSphere Application Server 7.0, 8.0, 8.5, 9.0, and Liberty
could allow a remote attacker to obtain sensitive information when a stack
trace is returned in the browser. IBM X-Force ID: 163177.
CVSS Base score: 5.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
163177 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)

CVEID: CVE-2019-4304
DESCRIPTION: IBM WebSphere Application Server - Liberty could allow a remote
attacker to bypass security restrictions caused by improper session validation.
IBM X-Force ID: 160950.
CVSS Base score: 6.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
160950 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L)

CVEID: CVE-2014-3603
DESCRIPTION: The (1) HttpResource and (2) FileBackedHttpResource
implementations in Shibboleth Identity Provider (IdP) before 2.4.1 and OpenSAML
Java 2.6.2 do not verify that the server hostname matches a domain name in the
subject's Common Name (CN) or subjectAltName field of the X.509 certificate,
which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary
valid certificate.
CVSS Base score: 6.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
164271 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N)

CVEID: CVE-2019-4305
DESCRIPTION: IBM WebSphere Application Server Liberty could allow a remote
attacker to obtain sensitive information caused by the improper setting of a
cookie. IBM X-Force ID: 160951.
CVSS Base score: 5.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
160951 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)

CVEID: CVE-2019-4442
DESCRIPTION: IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9,0 could
allow a remote attacker to traverse directories on the file system. An attacker
could send a specially-crafted URL request to view arbitrary files on the
system but not content. IBM X-Force ID: 163226.
CVSS Base score: 4.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
163226 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)

CVEID: CVE-2019-4505
DESCRIPTION: IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 Network
Deployment could allow a remote attacker to obtain sensitive information,
caused by sending a specially-crafted URL. This can lead the attacker to view
any file in a certain directory. IBM X-Force ID: 164364.
CVSS Base score: 3.7
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
164364 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N)

CVEID: CVE-2019-12402
DESCRIPTION: The file name encoding algorithm used internally in Apache Commons
Compress 1.15 to 1.18 can get into an infinite loop when faced with specially
crafted inputs. This can lead to a denial of service attack if an attacker can
choose the file names inside of an archive created by Compress.
CVSS Base score: 5.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
165956 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)

CVEID: CVE-2019-10092
DESCRIPTION: In Apache HTTP Server 2.4.0-2.4.39, a limited cross-site scripting
issue was reported affecting the mod_proxy error page. An attacker could cause
the link on the error page to be malformed and instead point to a page of their
choice. This would only be exploitable where a server was set up with proxying
enabled but was misconfigured in such a way that the Proxy Error page was
displayed.
CVSS Base score: 4.7
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
165367 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N)

CVEID: CVE-2019-10098
DESCRIPTION: In Apache HTTP server 2.4.0 to 2.4.39, Redirects configured with
mod_rewrite that were intended to be self-referential might be fooled by
encoded newlines and redirect instead to an unexpected URL within the request
URL.
CVSS Base score: 3.7
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
165366 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N)

CVEID: CVE-2019-4268
DESCRIPTION: IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 could
allow a remote attacker to traverse directories on the system. An attacker
could send a specially-crafted URL containing "dot dot" sequences (/../) to
view arbitrary files on the system. IBM X-Force ID: 160201.
CVSS Base score: 5.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
160201 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)

Affected Products and Versions

These vulnerabilities affect the following versions and releases of IBM
WebSphere Application Server in IBM Cloud:

  o Liberty
  o Version 9.0
  o Version 8.5

Remediation/Fixes

To patch an existing service instance, refer to the IBM WebSphere Application
Server bulletins listed below

  o File traversal vulnerability in WebSphere Application Server Admin Console
    (CVE-2019-4268)
  o Path traversal vulnerability in WebSphere Application Server Admin Console
    (CVE-2019-4442)
  o HTTP Parameter Pollution and XSS vulnerability in WebSphere Application
    Server Admin Console ND (CVE-2019-4271)
  o Information disclosure vulnerability in WebSphere Application Server
    (CVE-2019-4477)
  o Multiple vulnerabilities in IBM HTTP Server used by WebSphere Application
    Server
  o Information disclosure in WebSphere Application Server ND (CVE-2019-4505)
  o Multiple vulnerabilities in WebSphere Application Server Liberty
    (CVE-2019-4304, CVE-2019-4305)
  o Information disclosure vulnerability in WebSphere Application Server
    (CVE-2019-4441)
  o Cross-site scripting vulnerability in WebSphere Application Server Admin
    Console (CVE-2019-4270)
  o Multiple vulnerabilities in HTTP/2 implementation used by WebSphere
    Application Server Liberty
  o Denial of service vulnerability in WebSphere Application Server Liberty
    (CVE-2019-12402)
  o Man in the middle vulnerability in WebSphere Application Server Liberty
    (CVE-2014-3603)
  o Multiple Vulnerabilities in IBM Java SDK affect WebSphere Application
    Server October 2019 CPU

Please see Updating your environment in the KnowlegeCenter for information on
applying service.

Alternatively, delete the vulnerable service instance and create a new
instance.

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

References

- --------------------------------------------------------------------------------

Multiple Vulnerabilities in IBM® Java SDK affect WebSphere Application Server
October 2019 CPU

Security Bulletin

Summary

There are multiple vulnerabilities in the IBM SDK, Java Technology Edition that
is shipped with IBM WebSphere Application Server. These might affect some
configurations of IBM WebSphere Application Server Traditional, IBM WebSphere
Application Server Liberty and IBM WebSphere Application Server Hypervisor
Edition. These products have addressed the applicable CVEs. If you run your own
Java code using the IBM Java Runtime delivered with this product, you should
evaluate your code to determine whether the complete list of vulnerabilities is
applicable to your code. For a complete list of vulnerabilities, refer to the
link for "IBM Java SDK Security Bulletin" located in the References section for
more information. HP fixes are on a delayed schedule.

Vulnerability Details

CVEID: CVE-2019-2989
DESCRIPTION: An unspecified vulnerability in Java SE could allow an
unauthenticated attacker to cause no confidentiality impact, high integrity
impact, and no availability impact.
CVSS Base score: 6.8
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
169295 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N)

Affected Products and Versions

IBM SDK, Java Technology Editions used with WebSphere Application Server
Liberty
IBM SDK, Java Technology Editions used with IBM WebSphere Application Server
Traditional Version 9.0.0.0 through 9.0.5.1, 8.5.0.0 through 8.5.5.16.
IBM SDK, Java Technology Editions shipped in Application Client for IBM
WebSphere Application Server Version 9.0.0.0 through 9.0.5.1, 8.5.0.0 through
8.5.5.16.

Remediation/Fixes

Download and apply the interim fix APARs below, for your appropriate release

For the IBM Java SDK updates:

For WebSphere Application Server Liberty:

Upgrade to IBM SDK, Java Technology Edition Version 8 SR6, refer to IBM Java
SDKs for Liberty

For Version 9 WebSphere Application Server Traditional:

Update to the IBM SDK, Java Technology Edition, Version 8 Service Refresh 6
using the instructions in the IBM Knowledge Center Installing and updating IBM
SDK, Java Technology Edition on distributed environments then use the IBM
Installation Manager to access the online product repositories to install the
SDK or use IBM Installation Manager and access the packages from Fixcentral .

For V8.5.0.0 through 8.5.5.16 WebSphere Application Server Traditional and
WebSphere Application Server Hypervisor Edition:

For the IBM SDK, Java Technology Version that you use, upgrade to the minimal
fix pack level of WebSphere Application Server as noted in the interim fix
below then apply the interim fixes:

For IBM SDK Java Technology Edition Version 7

  o Apply interim fix PH18485 : Will upgrade you to IBM SDK, Java Technology
    Edition, Version 7 Service Refresh 10 Fix Pack 55

For IBM SDK Java Technology Edition Version 7R1

  o Apply interim fix PH18484 : Will upgrade you to IBM SDK, Java Technology
    Edition, Version 7R1 Service Refresh 4 Fix Pack 55

For IBM SDK Java Technology Edition Version 8

  o Apply interim fix PH18481 : Will upgrade you to IBM SDK, Java Technology
    Edition, Version 8 Service Refresh 6
  o For environments that have been upgraded to use the new default IBM SDK
    Version 8 bundled with WebSphere Application Server Fix Pack 8.5.5.11 or
    later: Apply interim fix PH18482 : Will upgrade you to IBM SDK, Java
    Technology Edition, Version 8 Service Refresh 6

OR

  o Apply IBM Java SDK shipped with WebSphere Application Server Fix pack 17
    (8.5.5.17) or later (targeted availability 1Q 2020).

For Application Client for WebSphere Application Server:

Follow instructions above for the WebSphere Application Server to download the
interim fix needed for your version of the Application Client.

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

References

- --------------------------------------------------------------------------------

WebSphere Application Server Liberty is vulnerable to Cross-site Scripting
(CVE-2019-4663)

Security Bulletin

Summary

There is a cross-site scripting vulnerability in the Admin Center. This has
been addressed.

Vulnerability Details

CVEID: CVE-2019-4663
DESCRIPTION: IBM WebSphere Application Server - Liberty is vulnerable to
cross-site scripting. This vulnerability allows users to embed arbitrary
JavaScript code in the Web UI thus altering the intended functionality
potentially leading to credentials disclosure within a trusted session.
CVSS Base score: 5.4
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/
171245 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N)

Affected Products and Versions

+------------------------------------+--------------------+
|Affected Product(s)                 |Version(s)          |
+------------------------------------+--------------------+
|WebSphere Application Server Liberty|17.0.0.3 - 19.0.0.11|
+------------------------------------+--------------------+

Remediation/Fixes

For WebSphere Application Server Liberty using adminCenter-1.0[]:

. Upgrade to minimal fix pack levels as required by interim fix and then apply
Interim Fix PH18799
- --OR--
. Apply Fix Pack 19.0.0.12 or later (targeted availability 4Q2019).

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

References

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=RcZP
-----END PGP SIGNATURE-----