IBM Support

Security Bulletin: IBM InfoSphere Information Server may be vulnerable to attacks based on privilege escalation

Security Bulletin


Summary

A potential vulnerability based on privilege escalation was addressed by IBM InfoSphere Information Server.

Vulnerability Details

CVEID:   CVE-2020-4347
DESCRIPTION:   IBM InfoSphere Information Server could be subject to attacks based on privilege escalation due to inappropriate file permissions for files used by WebSphere Application Server Network Deployment.
CVSS Base score: 7.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/178412 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)

Affected Products and Versions

Affected Product(s) Version
InfoSphere Information Server, Information Server on Cloud 11.7
InfoSphere Information Server, Information Server on Cloud 11.5
InfoSphere Information Server 11.3



If your Information Server installation uses WebSphere Application Server Network Deployment (WAS ND), it is affected if the following apply:

  • was initially installed using a umask weaker than 022
      Note that the install instructions indicate that umask 022 should be used.

                                           --  or  --
  • is Information Server version 11.7.1.0 or versions 11.7.0.x, or such an installation was upgraded to a release after 11.7.1.0
      Note:
           1. Versions 11.5 and 11.3 are not impacted until they are upgraded to version 11.7.
           2. A new installation of version 11.7.1.1 (or later) is not impacted.

Remediation/Fixes


You should do the following steps (only needed once over the lifetime of the installation):

   Stand-alone deployment
   1.  In your WAS ND location, change directory to the directory containing the java folder.
   2.  chmod -R 755 java

   Cluster deployment
   1.  On the machine where your deployment manager is installed
        a.  change directory to the directory containing the java folder within your WAS ND installation
        b.  chmod -R 755 java

   2.  On a machine where a custom profile is installed
        a.  change directory to the directory containing the java folder within your WAS ND installation
        b.  chmod -R 755 java

   3.  Repeat step 2 for each custom profile, and horizontal machine that is a member of the cluster.

Workarounds and Mitigations

see Remediation/Fixes section.

Get Notified about Future Security Bulletins

References

Off

Acknowledgement

The vulnerability was reported to IBM by Ashneel Prasad.

Change History

15 April 2020: Initial Publication
17 April 2020: Added acknowledgement
20 April 2020: Added versions 11.7.x.x as impacted irrespective of umask setting
08 July 2020: New installations of 11.7.1.1 or later are not impacted

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer

Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.

Document Location

Worldwide

[{"Business Unit":{"code":"BU059","label":"IBM Software w\/o TPS"},"Product":{"code":"SSZJPZ","label":"IBM InfoSphere Information Server"},"Component":"","Platform":[{"code":"PF002","label":"AIX"},{"code":"PF016","label":"Linux"},{"code":"PF033","label":"Windows"}],"Version":"11.7; 11.5; 11.3","Edition":"","Line of Business":{"code":"LOB10","label":"Data and AI"}}]

Document Information

Modified date:
08 July 2020

UID

ibm16191679