Security Bulletin
Summary
Cross-site scripting vulnerability in Business Space allows a remote attacker to inject script.
Vulnerability Details
CVEID: CVE-2018-1384
DESCRIPTION: IBM Business Process Manager is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
CVSS Base Score: 5.4
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/138135 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N)
Affected Products and Versions
- IBM Business Process Manager V7.5.0.0 through V7.5.1.2
- IBM Business Process Manager V8.0.0.0 through V8.0.1.3
- IBM Business Process Manager V8.5.0.0 through V8.5.0.2
- IBM Business Process Manager V8.5.5.0
- IBM Business Process Manager V8.5.6.0 through V8.5.6.0 CF2
- IBM Business Process Manager V8.5.7.0 through V8.5.7.0 Cumulative Fix 2017.06
- IBM Business Process Manager V8.6.0.0 through V8.6.0.0 Cumulative Fix 2017.12
- IBM Business Process Manager Enterprise Service Bus V8.6.0.0
- WebSphere Enterprise Service Bus V7.0.0.0 through V7.0.0.5
- WebSphere Enterprise Service Bus Registry Edition V7.0.0.0 through V7.0.0.5
- WebSphere Enterprise Service Bus V7.5.0.0 through V7.5.1.2
- WebSphere Enterprise Service Bus Registry Edition V7.5.0.0 through V7.5.1.2
- WebSphere Process Server V7.0.0.0 through V7.0.0.5
Remediation/Fixes
The recommended solution is to apply the Interim Fix (iFix) or Cumulative Fix (CF) containing APAR JR58937 as soon as practical:
- IBM Business Process Manager
- IBM Business Process Manager Advanced
- IBM Business Process Manager Standard
- IBM Business Process Manager Express
- WebSphere Process Server
- WebSphere Enterprise Service Bus (including WESB Registry Edition)
Because IBM Business Process Manager V7.5, V8.0 and WebSphere Process Server V7.0 are out of general support, fixes for V7.0, V7.5, V8.0 for these products and WebSphere Enterprise Service Bus V7.0 and V7.5 and WebSphere Enterprise Service Bus Registry Edition V7.0 and V7.5 can be requested from IBM support by eligible customers.
Workarounds and Mitigations
None
Get Notified about Future Security Bulletins
Important Note
IBM strongly suggests that all System z customers be subscribed to the System z Security Portal to receive the latest critical System z security and integrity service. If you are not subscribed, see the instructions on the System z Security web site. Security and integrity APARs and associated fixes will be posted to this portal. IBM suggests reviewing the CVSS scores and applying all security or integrity fixes as soon as possible to minimize any potential risk.
References
Change History
23 March 2018: initial version published
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
Disclaimer
Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.
Internal Use Only
Advisory ID 10738
Was this topic helpful?
Document Information
Modified date:
15 September 2022
UID
swg22012604