=================================================================== CERT-Renater Note d'Information No. 2021/VULN096 ____________________________________________________________________ DATE : 24/02/2022 HARDWARE PLATFORM(S): / OPERATING SYSTEM(S): Systems running IBM WebSphere Application Server. ====================================================================https://www.ibm.com/support/pages/node/6558594 _____________________________________________________________________ IBM WebSphere Application Server is vulnerable to remote code execution due to Dojo (CVE-2021-23450) Document Information More support for : WebSphere Application Server Software version : 7.0, 8.0, 8.5, 9.0, Liberty Operating system(s): AIX, HP-UX, IBM i, Linux, Solaris, Windows, z/OS, Mac OS Document number : 6558594 Modified date : 23 February 2022 Summary There is a vulnerability in the Dojo library used by IBM WebSphere Application Server traditional in the Admin Console and used by the IBM WebSphere Application Server Liberty with the adminCenter-1.0 feature enabled. This has been addressed. Vulnerability Details CVEID: CVE-2021-23450 DESCRIPTION: Dojo could allow a remote attacker to execute arbitrary code on the system, caused by a prototype pollution in the setObject function. By sending a specially-crafted reuqest, an attacker could exploit this vulnerability to execute arbitrary code on the system. CVSS Base score: 9.8 CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/ 216463 for the current score. CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) Affected Products and Versions +----------------------------------------+-------------------+ |Affected Product(s) |Version(s) | +----------------------------------------+-------------------+ |IBM WebSphere Application Server Liberty|17.0.0.3 - 22.0.0.2| +----------------------------------------+-------------------+ |IBM WebSphere Application Server |9.0 | +----------------------------------------+-------------------+ |IBM WebSphere Application Server |8.5 | +----------------------------------------+-------------------+ |IBM WebSphere Application Server |8.0 | +----------------------------------------+-------------------+ |IBM WebSphere Application Server |7.0 | +----------------------------------------+-------------------+ Remediation/Fixes IBM strongly recommends addressing the vulnerability now by applying a currently available interim fix or fix pack that contains the APAR PH43148 or APAR PH43817. To determine if a feature is enabled for WebSphere Application Server Liberty, refer to How to determine if Liberty is using a specific feature . For IBM WebSphere Application Server Liberty 17.0.0.3 - 22.0.0.2 using the adminCenter-1.0 feature: . Upgrade to minimal fix pack levels as required by interim fix and then apply Interim Fix PH43817 - --OR-- . Apply Fix Pack 22.0.0.3 or later (targeted availability 1Q2022). For IBM WebSphere Application Server traditional: For V9.0.0.0 through 9.0.5.10: · Upgrade to minimal fix pack levels as required by interim fix and then apply Interim Fix PH43148 --OR-- · Apply Fix Pack 9.0.5.12 or later (targeted availability 2Q2022). For V8.5.0.0 through 8.5.5.21: . Upgrade to minimal fix pack levels as required by interim fix and then apply Interim Fix PH43148 - --OR-- . Apply Fix Pack 8.5.5.22 or later (targeted availability 3Q2022). For V8.0.0.0 through 8.0.0.15: . Upgrade to 8.0.0.15 and then apply Interim Fix PH43148 For V7.0.0.0 through 7.0.0.45: . Upgrade to 7.0.0.45 and then apply Interim Fix PH43148 Additional interim fixes may be available and linked off the interim fix download page. IBM WebSphere Application Server V7.0 and V8.0 are no longer in full support; IBM recommends upgrading to a fixed, supported version/release/platform of the product. Workarounds and Mitigations None To determine if a feature is enabled for WebSphere Application Server Liberty, refer to How to determine if Liberty is using a specific feature . Change History 22 Feb 2022: Initial Publication 23 Feb 2022: Updated version range for v9 ========================================================+ CERT-RENATER | tel : 01-53-94-20-44 + + 23/25 Rue Daviel | fax : 01-53-94-20-41 + + 75013 Paris | email:cert@support.renater.fr + =======================================================