Security Bulletin
Summary
The Apache Solr that is shipped with IBM Rational ClearQuest contains multiple security vulnerabilities. IBM Rational ClearQuest has addressed the applicable CVEs.
Vulnerability Details
CVEID: CVE-2013-6407
DESCRIPTION: Apache Solr could allow a remote authenticated attacker to obtain sensitive information, caused by an error when parsing XML entities. By persuading a victim to open a specially-crafted XML document containing external entity references, an attacker could exploit this vulnerability to obtain sensitive information.
CVSS Base Score: 4
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/89379 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:S/C:P/I:N/A:N)
CVEID: CVE-2013-6408
DESCRIPTION: Apache Solr could allow a remote authenticated attacker to obtain sensitive information, caused by an error when parsing XML entities. By persuading a victim to open a specially-crafted XML document containing external entity references, an attacker could exploit this vulnerability to obtain sensitive information.
CVSS Base Score: 4
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/89380 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:S/C:P/I:N/A:N)
Affected Products and Versions
IBM Rational ClearQuest, versions 8.0, 8.0.1, 9.0 and 9.0.1 in the following component:
- ClearQuest Full-Text Search.
ClearQuest version | Status |
9.0.1, 9.0.1.1 | Affected |
9.0 through 9.0.0.5 | Affected |
8.0.1 through 8.0.1.15 | Affected |
8.0 through 8.0.0.21 | Affected |
Remediation/Fixes
To fix your existing installation, you must uninstall ClearQuest, then install the appropriate fix pack that contains the fixes. The uninstall procedure will save settings and configurations; the install procedure will offer to restore them.
As an alternative, you can change the configuration of your current system, see the "Workarounds and Mitigations" section below.
Affected Versions | Applying the fix |
9.0.1, 9.0.1.1 | Uninstall your current ClearQuest version, then install Rational ClearQuest Fix Pack 2 (9.0.1.2) for 9.0.1 |
9.0 through 9.0.0.5 | Uninstall your current ClearQuest version, then install Rational ClearQuest Fix Pack 6 (9.0.0.6) for 9.0 |
8.0.1 through 8.0.1.15 8.0 through 8.0.0.21 | Uninstall your current ClearQuest version, then install Rational ClearQuest Fix Pack 16 (8.0.1.16) for 8.0.1 |
Workarounds and Mitigations
The mitigation is to take the following steps:
- Locate the file
<CQFTS_Home>/<DBSet_UserDB>/Solr/solr/conf/solrconfig.xml
- Find the following two XML blocks that read
<requestHandler name="/update/xslt"
startup="lazy"
class="solr.XsltUpdateRequestHandler"/>
And
<requestHandler name="/analysis/document"
class="solr.DocumentAnalysisRequestHandler"
startup="lazy"/>
- Either remove those two XML blocks or comment them out.
If you wish to use comments to exclude these blocks, you may use code like this surrounding the blocks:
<!--
...commented out block lines...
-->
- Locate the file
<CQFTS_Home>/<DBSet_UserDB>/Solr/typeahead/conf/solrconfig.xml
- Find the following two XML blocks that read
<requestHandler name="/update/xslt"
startup="lazy"
class="solr.XsltUpdateRequestHandler"/>
And
<requestHandler name="/analysis/document"
class="solr.DocumentAnalysisRequestHandler"
startup="lazy"/>
- Either remove those two XML blocks or comment them out.
If you wish to use comments to exclude these blocks, you may use code like this surrounding the blocks:
<!--
...commented out block lines...
-->
- Using
cqtsadmin.pl
script, run the commands--stop_fts_was_profile
and--start_fts_was_profile
as documented here https://www.ibm.com/support/knowledgecenter/en/SSSH5A_9.0.1/com.ibm.rational.clearquest.cli.doc/topics/r_cqtsadmin_pl.htm to restart Solr so the changes to thesolrconfig.xml
files take effect.
Attention: The above steps must be done for all instances of ClearQuest Full-Text Search that you have deployed in your environment. (For each Full-Text Search enabled User Database). |
Affected Versions | Applying the fix |
8.0.0.x 8.0.1.x 9.0.0.x 9.0.1.x | Apply the above fix directly to your ClearQuest. |
Get Notified about Future Security Bulletins
References
Change History
17 October 2017: Original version published
18 December 2017: Updated to refer to fix packs with fixes
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
Disclaimer
Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.
Internal Use Only
Assess vulnerability to Adv 1353/PR 31700 ("Open Source Apache Solr has released 3 security fixes") (61736) (CCM)
When future versions of ClearQuest ship with the fix, only existing deployments needs to use this correction, all new deployments of CQ FTS instances will not have this vulnerability. Work tracking this is in [PSIRT 1353] remove 2 Solr request handlers: requestHandler and requestHandler (65206) and currently planned for 2018A (subject to change). --david.sampson@hcl.com per George Aroush.
Was this topic helpful?
Document Information
Modified date:
17 June 2018
UID
swg22008531