IBM Support

IT43112: SECURITY APAR FOR CVE-2020-28500, CVE-2021-23337, CVE-2020-8203

Subscribe to this APAR

By subscribing, you receive periodic emails alerting you to the status of the APAR, along with a link to the fix after it becomes available. You can track this item individually or track all items by product.

Notify me when this APAR changes.

Notify me when an APAR for this component changes.

 

APAR status

  • Closed as program error.

Error description

  • CVEID: CVE-2020-28500
    Description: Node.js lodash module is vulnerable to a denial of
    service, caused by a regular expression denial of service
    (ReDoS) in the toNumber, trim and trimEnd functions. By sending
    a specially-crafted request, a remote attacker could exploit
    this vulnerability to cause a denial of service condition.
    
    CVEID: CVE-2021-23337
    Description: Node.js lodash module could allow a remote
    authenticated attacker to execute arbitrary commands on the
    system, caused by a command injection flaw in the template. By
    sending a specially-crafted request, an attacker could exploit
    this vulnerability to execute arbitrary commands on the system.
    
    CVEID: CVE-2020-8203
    Description: Node.js lodash module is vulnerable to a denial of
    service, caused by a prototype pollution attack. A remote
    attacker could exploit this vulnerability using the merge,
    mergeWith, and defaultsDeep functions to inject properties onto
    Object.prototype to crash the server and possibly execute
    arbitrary code on the system.
    

Local fix

Problem summary

  • ****************************************************************
    * USERS AFFECTED:                                              *
    * IBM Storage Insights users                                   *
    *                                                              *
    ****************************************************************
    * PROBLEM DESCRIPTION:                                         *
    * SECURITY APAR FOR:                                           *
    * CVE-2020-28500, CVE-2021-23337,                              *
    * CVE-2020-8203                                                *
    ****************************************************************
    * RECOMMENDATION:                                              *
    ****************************************************************
    

Problem conclusion

  • The fix for this APAR is contained in the following release:
    
    IBM Storage Insights 1Q23   [ 54X-IBM-SI ]
    ( 1Q 2023 / February )
    
    To protect IBM Storage Insights against emerging
    security vulnerabilities, the service was updated to
    protected against vulnerabilities.
    
    No action is required, there is nothing that you
    need to do following the IBM Storage Insights
    update.
    

Temporary fix

Comments

APAR Information

  • APAR number

    IT43112

  • Reported component name

    STORAGE INSIGHT

  • Reported component ID

    5608TPCSI

  • Reported release

    54X

  • Status

    CLOSED PER

  • PE

    NoPE

  • HIPER

    NoHIPER

  • Special Attention

    NoSpecatt / Xsystem

  • Submitted date

    2023-02-14

  • Closed date

    2023-02-15

  • Last modified date

    2023-02-15

  • APAR is sysrouted FROM one or more of the following:

  • APAR is sysrouted TO one or more of the following:

Fix information

  • Fixed component name

    STORAGE INSIGHT

  • Fixed component ID

    5608TPCSI

Applicable component levels

[{"Business Unit":{"code":"BU029","label":"Software"},"Product":{"code":"SSYS7R","label":"IBM Spectrum Control Storage Insights"},"Platform":[{"code":"PF025","label":"Platform Independent"}],"Version":"54X"}]

Document Information

Modified date:
16 February 2023