Security Bulletin
Summary
Smarter Infrastructure Products - Potential cross-site scripting vulnerability when using Maximo Asset Management and SmartCloud Control Desk products.
Vulnerability Details
CVE IDs: CVE-2013-5402
DESCRIPTION:
CVE ID | DESCRIPTION |
CVE-2013-5402 CVSS Base Score: 3.5 CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/87298 CVSS Environmental Score*: Undefined CVSS Vector: (AV:N/AC:M/Au:S/C:N/I:P/A:N) | Cross-site scripting |
Affected Products and Versions
AFFECTED PRODUCTS:
· Maximo Asset Management 7.5, 7.1
· Maximo Asset Management Essentials 7.5, 7.1
· Maximo for Government 7.5, 7.1
· Maximo for Nuclear Power 7.5, 7.1
· Maximo for Transportation 7.5, 7.1
· Maximo for Life Sciences 7.5, 7.1
· Maximo for Oil and Gas 7.5, 7.1
· Maximo for Utilities 7.5, 7.1
· SmartCloud Control Desk 7.5
· Tivoli Asset Management for IT 7.2, 7.1
· Tivoli Service Request Manager 7.2, 7.1
· Change and Configuration Management Database 7.2, 7.1
It is likely that earlier unsupported versions are also affected by these vulnerabilities. Remediation is not provided for product versions that are no longer supported. IBM recommends that customers running unsupported versions upgrade to the latest supported version of products in order to obtain remediation for the vulnerabilities.
Remediation/Fixes
VENDOR FIXES:
The recommended solution is to download the appropriate Interim Fix or Fix Pack from Fix Central (What is Fix Central?) and apply for each affected product as soon as possible. Please see below for information on the fixes available for each product, version, and release. Follow the installation instructions in the ‘readme’ documentation provided with each fix pack or interim fix.
For Maximo Asset Management, Maximo Asset Management Essentials, Maximo for Government, Maximo for Nuclear Power, Maximo for Transportation, Maximo for Life Sciences, Maximo for Oil and Gas, and Maximo for Utilities:
VRMF | Fix Pack or Interim Fix | Vulnerability APARs | Target Availability | Download |
7.5.0.5 | Maximo 7.5.0.5 Interim Fix: 7.5.0.5-TIV-MAM-IFIX003 or latest Interim Fix available | IV49268 | 2/15/2014 | FixCentral when available |
7.5.0.3 | Maximo 7.5.0.3 Interim Fix: 7.5.0.3-TIV-MAM-IFIX014 or latest Interim Fix available | IV49268 | Available now | FixCentral |
7.1.1.12 | Maximo 7.1.1.12 Interim Fix: MBS_71112_LAFIX.yyyymmdd-bbbb or latest Interim Fix available after 1/31/2014 | IV49268 | 1/31/2014 | Contact IBM Support |
For SmartCloud Control Desk, Tivoli Asset Management for IT, Tivoli Service Request Manager, Maximo Service Desk, and Change and Configuration Management Database:
VRMF | Fix Pack or Interim Fix | Vulnerability APARs | Target Availability | Download |
7.5.0.5 | SCCD 7.5.0.5 Interim Fix: 7.5.0.5-TIV-MAM-IFIX003 or latest Interim Fix available | IV49268 | 2/15/2014 | Contact IBM Support |
7.5.0.3 | SCCD 7.5.0.3 Interim Fix: 7.5.0.3-TIV-MAM-IFIX014 or latest Interim Fix available | IV49268 | Available now | Contact IBM Support |
7.1.1.12 | MBS 7.1.1.12 Interim Fix: MBS_71112_LAFIX.yyyymmdd-bbbb or latest Interim Fix available after 1/31/2014 | IV49268 | 1/31/2014 | Contact IBM Support |
Due to the threat posed by a successful attack, IBM strongly recommends that customers apply fixes as soon as possible.
Workarounds and Mitigations
Until you apply the fixes, it may be possible to reduce the risk of successful attack by restricting network protocols required by an attack. For attacks that require certain privileges or access to certain packages, removing the privileges or the ability to access the packages from unprivileged users may help reduce the risk of successful attack. Both approaches may break application functionality, so IBM strongly recommends that customers test changes on non-production systems. Neither approach should be considered a long-term solution as neither corrects the underlying problem.
Get Notified about Future Security Bulletins
References
On-line Calculator V2
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Flash.
Note: According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.
RELATED INFORMATION:
ACKNOWLEDGEMENTS:
This vulnerability was reported to IBM by Pen Test Partners.
Change History | |
13 Dec 2013 | Flash published |
CROSS REFERENCE INFORMATION:
Segment | Product | Component/Platform | Version |
Systems and Asset Management | Maximo Asset Management | All | 7.1.1.0 – 7.1.1.12 7.5.0.0 – 7.5.0.5 |
Systems and Asset Management | Maximo Asset Management Essentials | All | 7.1.1.0 – 7.1.1.12 7.5.0.0 – 7.5.0.5 |
Systems and Asset Management | Maximo for Government | All | 7.1.0.0 7.5.0.0 |
Systems and Asset Management | Maximo for Nuclear Power | All | 7.1.0.0 – 7.1.1.0 7.5.0.0 – 7.5.1.0 |
Systems and Asset Management | Maximo for Transportation | All | 7.1.0.0 – 7.1.1.0 7.5.0.0 – 7.5.1.0 |
Systems and Asset Management | Maximo for Life Sciences | All | 7.1.0.0 – 7.1.2.0 7.5.0.0 |
Systems and Asset Management | Maximo for Oil and Gas | All | 7.1.0.0 – 7.1.2.0 7.5.0.0 – 7.5.1.0 |
Systems and Asset Management | Maximo for Utilities | All | 7.1.0.0 – 7.1.2.0 7.5.0.0 |
Systems and Asset Management | Tivoli Service Request Manager | All | 7.1.0.0 – 7.1.1.12 7.2.0.0 – 7.2.1.3 |
Systems and Asset Management | Tivoli Asset Management for IT | All | 7.1.0.0 – 7.1.1.12 7.2.0.0 – 7.2.2.1 |
Systems and Asset Management | Change and Configuration Management Database | All | 7.1.0.0 – 7.1.1.12 7.2.0.0 – 7.2.1.2 |
Systems and Asset Management | SmartCloud Control Desk | All | 7.5.0.0 – 7.5.1.1 |
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
Disclaimer
Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.
Was this topic helpful?
Document Information
Modified date:
17 June 2018
UID
swg21660032