Security Bulletin
Summary
IBM Maximo Asset Management and the IBM Maximo Manage application in IBM Maximo Application Suite are vulnerable to information disclosure.
Vulnerability Details
DESCRIPTION: IBM Maximo Asset Management could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system.
CVSS Base score: 5.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/210163 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
Affected Products and Versions
This vulnerability affects the following versions of the IBM Maximo Asset Management core product and IBM Maximo Manage Application in IBM Maximo Application Suite. Older versions of Maximo Asset Management may be impacted. The recommended action is to update to the latest version.
Product versions affected:
Affected Product(s) | Version(s) |
IBM Maximo Asset Management | 7.6.1.3 |
IBM Maximo Asset Management | 7.6.1.2 |
IBM Maximo Asset Management | 7.6.1.1 |
Maximo Manage Application in IBM Maximo Application Suite | MAS 8.7-Manage 8.3 |
Maximo Manage Application in IBM Maximo Application Suite | MAS 8.8-Manage 8.4 |
* To determine the core product version, log in and view System Information. The core product version is the "Tivoli's process automation engine" version. Please consult the Platform Matrix for a list of supported product combinations.
Remediation/Fixes
The recommended solution is to download the appropriate Interim Fix or Fix Pack from Fix Central (What is Fix Central?) and apply for each affected product as soon as possible. Please see below for information on the fixes available for each product, version, and release. Follow the installation instructions in the ‘readme’ documentation provided with each fix pack or interim fix.
For Maximo Asset Management 7.6:
VRM | Fix Pack, Feature Pack, or Interim Fix | Download |
7.6.1.3 | Maximo Asset Management 7.6.1.3 Feature Pack: 7.6.1.3-TIV-MAMMT-FP003 or latest Interim Fix available |
FixCentral |
7.6.1.2 | Maximo Asset Management 7.6.1.2 iFix: 7.6.1.2-TIV-MBS-IF023 or latest Interim Fix available |
FixCentral |
7.6.1.1 | Maximo Asset Management 7.6.1.1 iFix: 7.6.1.1-TIV-MBS-IF022 or latest Interim Fix available |
FixCentral |
MAS | MAS Patch Fix or Release | Manage Patch Fix or Release |
8.7 |
Maximo Application Suite 8.7.3: |
8.3.3 or latest (available from the Catalog under Update Available) |
8.8 |
Maximo Application Suite 8.8: |
8.4 or latest (available from the Catalog under Update Available) |
Workarounds and Mitigations
No manual changes are required for Manage.
For MAM, edit the following files:
- applications/maximo/maximouiweb/webmodule/WEB-INF/web.xml
- deployment/was-liberty-default/config-deployment-descriptors/maximo-report/webmodule/WEB-INF/web.xml
- deployment/was-liberty-default/config-deployment-descriptors/maximo-ui/webmodule/WEB-INF/web.xml
In the files make sure the ReportRequestFilter filter-mappings are defined as follows (add any missing ones):
<filter-mapping>
<filter-name>ReportRequestFilter</filter-name>
<url-pattern>/report/*</url-pattern>
</filter-mapping>
<filter-mapping>
<filter-name>ReportRequestFilter</filter-name>
<url-pattern>/download/*</url-pattern>
</filter-mapping>
<filter-mapping>
<filter-name>ReportRequestFilter</filter-name>
<url-pattern>/output/*</url-pattern>
</filter-mapping>
<filter-mapping>
<filter-name>ReportRequestFilter</filter-name>
<url-pattern>/extract/*</url-pattern>
</filter-mapping>
Get Notified about Future Security Bulletins
References
Acknowledgement
Change History
11 Aug 2022: Initial Publication
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
Disclaimer
Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.
Document Location
Worldwide
Was this topic helpful?
Document Information
Modified date:
09 February 2023
UID
ibm16620059