About cookies on this site Our websites require some cookies to function properly (required). In addition, other cookies may be used with your consent to analyze site usage, improve the user experience and for advertising. For more information, please review your options. By visiting our website, you agree to our processing of information as described in IBM’sprivacy statement. To provide a smooth navigation, your cookie preferences will be shared across the IBM web domains listed here.
Security Bulletin
Summary
There is vulnerability in lodash which affects IBM VM Recovery Manager HA GUI
Vulnerability Details
CVEID: CVE-2020-28500
DESCRIPTION: Node.js lodash module is vulnerable to a denial of service, caused by a regular expression denial of service (ReDoS) in the toNumber, trim and trimEnd functions. By sending a specially-crafted request, a remote attacker could exploit this vulnerability to cause a denial of service condition.
CVSS Base score: 7.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/196972 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
CVEID: CVE-2021-23337
DESCRIPTION: Node.js lodash module could allow a remote authenticated attacker to execute arbitrary commands on the system, caused by a command injection flaw in the template. By sending a specially-crafted request, an attacker could exploit this vulnerability to execute arbitrary commands on the system.
CVSS Base score: 7.2
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/196797 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)
Affected Products and Versions
Affected Product(s) | Version(s) |
VMRM HA GUI | V1.5.0.1 and below |
Remediation/Fixes
Security fix is available at the following location:
https://aix.software.ibm.com/aix/efixes/security/VMRMHA/
The security fix contains filesets which should be installed over IBM VM Recovery Manager HA GUI 1.5.0.1
Following command can be used to install these filesets:
installp -ac -FXYd. ksys.ui.agent ksys.ui.server ksys.ui.common
Workarounds and Mitigations
None
Get Notified about Future Security Bulletins
References
Off
Change History
21 Sep 2021: Initial Publication
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
Disclaimer
Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.
Document Location
Worldwide
[{"Business Unit":{"code":"BU048","label":"Systems w\/TPS"},"Product":{"code":"SSHQN6","label":"IBM VM Recovery Manager HA for Power Systems"},"Component":"","Platform":[{"code":"PF002","label":"AIX"},{"code":"PF016","label":"Linux"},{"code":"PF012","label":"IBM i"}],"Version":"VMRM HA GUI V1.5.0.1 and below","Edition":""}]
Was this topic helpful?
Document Information
More support for:
IBM VM Recovery Manager HA for Power Systems
Software version:
VMRM HA GUI V1.5.0.1 and below
Operating system(s):
AIX, Linux, IBM i
Document number:
6493751
Modified date:
29 September 2021
UID
ibm16493751
Manage My Notification Subscriptions