Security Bulletin
Summary
IBM Maximo Asset Management configuration files set the attribute serveServletsByClassnameEnabled to true. This vulnerability could allow a remote attacker to gain elevated privileges on the system.
The vulnerability affects Maximo Asset Management, Maximo Asset Management Essentials, Maximo Industry Solutions (including Maximo for Energy Optimization, Maximo for Government, Maximo for Nuclear Power, Maximo for Transportation, Maximo for Life Sciences, Maximo for Oil and Gas, and Maximo for Utilities), SmartCloud Control Desk, Tivoli Asset Management for IT, Tivoli Service Request Manager, and Change and Configuration Management Database.
Additionally, IBM WebSphere Application Server is affected by this vulnerability, and is shipped as a component of the products listed above. Information about the security vulnerability affecting IBM WebSphere Application Server has been published in a related security bulletin.
Vulnerability Details
CVEID: CVE-2015-1927
DESCRIPTION: IBM WebSphere Application Server could allow a remote attacker to gain elevated privileges on the system, caused by an application not having the correct serveServletsbyClassname setting. By a developer not setting the correct property, an attacker could exploit this vulnerability to gain unauthorized access.
CVSS Base Score: 6.8
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/102872 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:P)
Affected Products and Versions
Affected Principal Product and Version | Affected Supporting Product and Version |
Maximo Asset Management 7.6 SmartCloud Control Desk 7.6 | IBM WebSphere Application Server 8.5.5 Full Profile IBM WebSphere Application Server 8.5 Full Profile |
Maximo Asset Management 7.5 Maximo Asset Management Essentials 7.5 Maximo for Government 7.5 Maximo for Nuclear Power 7.5 Maximo for Transportation 7.5 Maximo for Life Sciences 7.5 Maximo for Oil and Gas 7.5 Maximo for Utilities 7.5 Maximo Adapter for Primavera 7.5 SmartCloud Control Desk 7.5 TRIRIGA Energy Optimization 1.1 | IBM WebSphere Application Server 8.5.5 Full Profile IBM WebSphere Application Server 8.5 Full Profile IBM WebSphere Application Server 8.0 IBM WebSphere Application Server 7.0 |
Maximo Asset Management 7.1 Maximo Asset Management Essentials 7.1 Maximo Asset Management for Energy Optimization 7.1 Maximo for Government 7.1 Maximo for Nuclear Power 7.1 Maximo for Transportation 7.1 Maximo for Life Sciences 7.1 Maximo for Oil and Gas 7.1 Maximo for Utilities 7.1 Maximo Adapter for Primavera 7.1 | IBM WebSphere Application Server 7.0 |
Tivoli Asset Management for IT 7.2 Tivoli Service Request Manager 7.2 Change and Configuration Management Database 7.2 | IBM WebSphere Application Server 8.5.5 Full Profile IBM WebSphere Application Server 7.0 |
Remediation/Fixes
This vulnerability affects both Maximo Asset Management products, and WebSphere Application Server shipped with Maximo Asset Management products. The fix below provides complete protection for Maximo, but does not cover other uses of WebSphere Application Server. It is recommended that customers apply fixes for both products.
For information about fixes in WebSphere Application Server, please consult the security bulletin Multiple Security Vulnerabilities fixed in IBM WebSphere Application Server 8.5.5.6. Note that the vulnerability does affect other WebSphere Application Server versions besides 8.5.5.6. View the Security Bulletin for a list of all affected WebSphere Application Server versions, as well as fix and remediation information.
To protect against this vulnerability in Maximo Asset Management products, the recommended solution is to download the appropriate Interim Fix or Fix Pack from Fix Central (What is Fix Central?) and apply for each affected product as soon as possible. Please see below for information on the fixes available for each product, version, and release. Follow the installation instructions in the ‘readme’ documentation provided with each fix pack or interim fix.
Please note that for certain product versions below, two different Interim Fixes are listed: Maximo (MBS) and Maximo Integration Framework (MIF). If two Interim Fixes are listed for a given product version, both are necessary for complete protection against this vulnerability in Maximo. Please apply both fixes.
For Maximo Asset Management, Maximo Asset Management Essentials and Maximo Industry Solutions 7.6, 7.5, 7.1:
VRM | Fix Pack or Interim Fix | Download |
7.6.0 | Maximo 7.6.0.1 Interim Fix: 7.6.0.1-TIV-MBS-IFIX002 or latest Interim Fix available AND Maximo MIF 7.6.0.1 Interim Fix: 7.6.0.1-TIV-MIF-IFIX001 or latest MIF Interim Fix available | FixCentral |
7.5.0 | Maximo 7.5.0.8 Interim Fix: 7.5.0.8-TIV-MBS-IFIX004 or latest Interim Fix available AND Maximo MIF 7.5.1.3 Interim Fix: 7.5.1.3-TIV-MIF-IFIX001 or latest MIF Interim Fix available | FixCentral |
7.1.1 | 7.1.1.13 Interim Fix: Latest Interim Fix available | Contact IBM Support |
For SmartCloud Control Desk 7.6, 7.5:
VRM | Fix Pack or Interim Fix | Download |
7.6.0 | Maximo 7.6.0.1 Interim Fix: 7.6.0.1-TIV-MBS-IFIX002 or latest Interim Fix available AND Maximo MIF 7.6.0.1 Interim Fix: 7.6.0.1-TIV-MIF-IFIX001 or latest MIF Interim Fix available | FixCentral |
7.5.1 | Maximo 7.5.0.8 Interim Fix: 7.5.0.8-TIV-MBS-IFIX004 or latest Interim Fix available AND Maximo MIF 7.5.1.3 Interim Fix: 7.5.1.3-TIV-MIF-IFIX001 or latest MIF Interim Fix available | FixCentral |
7.5.0 | Maximo 7.5.0.8 Interim Fix: 7.5.0.8-TIV-MBS-IFIX004 or latest Interim Fix available AND Maximo MIF 7.5.1.3 Interim Fix: 7.5.1.3-TIV-MIF-IFIX001 or latest MIF Interim Fix available | FixCentral |
For Tivoli IT Asset Management for IT, Tivoli Service Request Manager, and Change and Configuration Management Database 7.2, 7.1:
VRM | Fix Pack or Interim Fix | Download |
7.1 - 7.2 | 7.1.1.13 Interim Fix: Latest Interim Fix available | Contact IBM Support |
Workarounds and Mitigations
As an alternative to the Maximo Fix Pack or Interim Fix install above, customers may manually apply an equivalent fix for the vulnerability in Maximo by completing the following steps. The manual fix provided below provides complete protection for Maximo, but does not cover other uses of WebSphere Application Server. It is recommended that customers apply fixes for both products. For information about fixes in WebSphere Application Server, please see the Remediation/Fixes section above, and consult the security bulletin Multiple Security Vulnerabilities fixed in IBM WebSphere Application Server 8.5.5.6.
To manually apply protection against CVE-2015-1927 in Maximo Asset Management products:
1. Navigate to each of the following file locations, and open the ibm-web-ext.xmi file found in each folder:
<maximo_root>\applications\maximo\maxrestweb\webmodule\WEB-INF
<maximo_root>\applications\maximo\meaweb\webmodule\WEB-INF
<maximo_root>\applications\maximo\maximouiweb\webmodule\WEB-INF
<maximo_root>\applications\maximo\mboweb\webmodule\WEB-INF
<maximo_root>\applications\maximo\tipchartws\webmodule\WEB-INF
2. In each ibm-web-ext.xmi file, set the value of every serveServletsByClassnameEnabled attribute to false: serveServletsByClassnameEnabled="false"
3. Delete the Maximo ear files, delete browser and app server caches, rebuild the Maximo ear files, and redeploy.
Get Notified about Future Security Bulletins
References
Change History
29 September 2015: Original version published
15 October 2015: Added Change History details
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
Disclaimer
Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.
Was this topic helpful?
Document Information
Modified date:
21 September 2022
UID
swg21967251