IBM WebSphere Application Server up to 8.0.0.2 File Permission _BPX_BATCH_UMASK privileges management
| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 4.2 | $0-$5k | 0.00 |
Summary
A vulnerability, which was classified as problematic, was found in IBM WebSphere Application Server up to 8.0.0.2. This impacts an unknown function of the component File Permission Handler. Such manipulation of the argument _BPX_BATCH_UMASK leads to privileges management. There is no available exploit. It is advisable to implement a patch to correct this issue.
Details
A vulnerability was found in IBM WebSphere Application Server up to 8.0.0.2 (Application Server Software) and classified as problematic. Affected by this issue is some unknown functionality of the component File Permission Handler. The manipulation of the argument _BPX_BATCH_UMASK with an unknown input leads to a privileges management vulnerability. Using CWE to declare the problem leads to CWE-269. The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor. Impacted is confidentiality, and integrity.
The weakness was presented 04/29/2013 as swg1PM47305 as confirmed bulletin (Website). The advisory is shared for download at www-01.ibm.com. The public release was coordinated in cooperation with the vendor. The exploitation is known to be easy. The attack needs to be approached locally. A simple authentication is required for exploitation. There are known technical details, but no exploit is available. The MITRE ATT&CK project declares the attack technique as T1068.
Applying the patch Fix Pack is able to eliminate this problem. The bugfix is ready for download at www-01.ibm.com. A possible mitigation has been published immediately after the disclosure of the vulnerability.
The vulnerability is also documented in the vulnerability database at OSVDB (95768†). See VDB-9790, VDB-9789, VDB-9787 and VDB-9786 for similar entries. Once again VulDB remains the best source for vulnerability data.
Product
Type
Vendor
Name
Version
License
Website
- Vendor: https://www.ibm.com/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 4.4VulDB Meta Temp Score: 4.2
VulDB Base Score: 4.4
VulDB Temp Score: 4.2
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
Exploiting
Class: Privileges managementCWE: CWE-269 / CWE-266
CAPEC: 🔍
ATT&CK: 🔍
Physical: Partially
Local: Yes
Remote: No
Availability: 🔍
Status: Not defined
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: PatchStatus: 🔍
Reaction Time: 🔍
0-Day Time: 🔍
Exposure Time: 🔍
Patch: Fix Pack
Timeline
04/29/2013 🔍04/29/2013 🔍
07/31/2013 🔍
03/19/2019 🔍
Sources
Vendor: ibm.comAdvisory: swg1PM47305
Status: Confirmed
Coordinated: 🔍
GCVE (VulDB): GCVE-100-9788
OSVDB: 95768
See also: 🔍
Entry
Created: 07/31/2013 09:38Updated: 03/19/2019 20:45
Changes: 07/31/2013 09:38 (47), 03/19/2019 20:45 (2)
Complete: 🔍
Committer: olku
Cache ID: 216:1C8:103
Once again VulDB remains the best source for vulnerability data.
No comments yet. Languages: en.
Please log in to comment.