IBM Support

IT44501: IBM STORAGE INSIGHTS SECURITY APAR FOR CVE-2023-30581, CVE-2023-30584, CVE-2023-30587

Subscribe to this APAR

By subscribing, you receive periodic emails alerting you to the status of the APAR, along with a link to the fix after it becomes available. You can track this item individually or track all items by product.

Notify me when this APAR changes.

Notify me when an APAR for this component changes.

 

APAR status

  • Closed as program error.

Error description

  • CVEID: CVE-2023-30581
    Description: Node.js could allow a remote attacker to bypass
    security restrictions, caused by the use of proto in
    process.mainModule.proto.require(). By sending a specially
    crafted request, an attacker could exploit this vulnerability to
    bypass experimental policy mechanism.
    
    CVEID: CVE-2023-30584
    Description: Node.js could allow a remote attacker to bypass
    security restrictions, caused by a path traversal bypass when
    verifying file permissions. By sending a specially crafted
    request, an attacker could exploit this vulnerability to bypass
    the experimental permission model.
    
    CVEID: CVE-2023-30587
    Description: Node.js could allow a remote attacker to bypass
    security restrictions. By exploiting the Worker class's
    ability to create an "internal worker" with the
    kIsInternal Symbol, an attacker could exploit this vulnerability
    to modify the isInternal value when an inspector is attached
    within the Worker constructor before initializing a new
    WorkerImpl.
    

Local fix

Problem summary

  • ****************************************************************
    * USERS AFFECTED:                                              *
    * IBM Storage Insights users                                   *
    *                                                              *
    ****************************************************************
    * PROBLEM DESCRIPTION:                                         *
    * SECURITY APAR FOR:                                           *
    * CVE-2023-30581, CVE-2023-30584,                              *
    * CVE-2023-30587                                               *
    *                                                              *
    ****************************************************************
    * RECOMMENDATION:                                              *
    ****************************************************************
    

Problem conclusion

  • The fix for this APAR is contained in the following release:
    
    IBM Storage Insights 3Q23   [ 54X-IBM-SI ]
    ( 3Q 2023 / September )
    
    To protect IBM Storage Insights against emerging
    security vulnerabilities, the service was updated to
    protected against vulnerabilities.
    
    No action is required, there is nothing that you need
    to do following the IBM Storage Insights upgrade.
    

Temporary fix

Comments

APAR Information

  • APAR number

    IT44501

  • Reported component name

    STORAGE INSIGHT

  • Reported component ID

    5608TPCSI

  • Reported release

    54X

  • Status

    CLOSED PER

  • PE

    NoPE

  • HIPER

    NoHIPER

  • Special Attention

    NoSpecatt / Xsystem

  • Submitted date

    2023-09-12

  • Closed date

    2023-09-13

  • Last modified date

    2023-09-13

  • APAR is sysrouted FROM one or more of the following:

  • APAR is sysrouted TO one or more of the following:

Fix information

  • Fixed component name

    STORAGE INSIGHT

  • Fixed component ID

    5608TPCSI

Applicable component levels

[{"Business Unit":{"code":"BU029","label":"Software"},"Product":{"code":"SSYS7R","label":"IBM Spectrum Control Storage Insights"},"Platform":[{"code":"PF025","label":"Platform Independent"}],"Version":"54X"}]

Document Information

Modified date:
14 September 2023