IBM Support

Security Bulletin:IBM TRIRIGA Application Platform discloses CVE-2020-25020

Security Bulletin


Summary

IBM TRIRIGA Application Platform discloses CVE-2020-25020

Vulnerability Details

CVEID:   CVE-2020-25020
DESCRIPTION:   MPXJ could allow a remote attacker to obtain sensitive information, caused by improper handling of XML external entity (XXE) declarations by the GanttProjectReader and PhoenixReader components. By persuading a victim to open specially-crafted XML content, a remote attacker could exploit this vulnerability to read arbitrary files on the server.
CVSS Base score: 5.5
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/187520 for the current score.
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N)

CVEID:   CVE-2020-35460
DESCRIPTION:   Packwood Software MPXJ could allow a remote attacker to traverse directories on the system. An attacker could send a specially-crafted URL request to the InputStreamHelper.java script containing "dot dot" sequences (/../) to modify arbitrary files on the system.
CVSS Base score: 5.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/193216 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)

Affected Products and Versions

Affected Product(s)Version(s)
IBM TRIRIGAAll

Remediation/Fixes

 

ProductVRMF
Remediation/First Fix
IBM TRIRIGA Application Platform3.6.1.3The fix is available for download on FixCentral.
IBM TRIRIGA Application Platform3.7.0.1The fix is available for download on FixCentral
IBM TRIRIGA Application Platform3.8.0.1The fix is available for download on FixCentral
IBM TRIRIGA Application Platform4.0.2The fix is available for download on FixCentral
IBM TRIRIGA Application Platform4.1.1The fix is available for download on FixCentral

Workarounds and Mitigations

None

Get Notified about Future Security Bulletins

References

Off

Change History

29 Aug 2022: Initial Publication

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer

Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.

Document Location

Worldwide

[{"Business Unit":{"code":"BU059","label":"IBM Software w\/o TPS"},"Product":{"code":"SSFCZ3","label":"IBM TRIRIGA Portfolio Data Manager"},"Component":"","Platform":[{"code":"PF016","label":"Linux"},{"code":"PF033","label":"Windows"}],"Version":"3.6, 2.7, 3.8, 4.0, 4.1","Edition":"","Line of Business":{"code":"LOB59","label":"Sustainability Software"}}]

Document Information

Modified date:
30 August 2022

UID

ibm16616289