Ce mail provient de l'extérieur, restons vigilants

=====================================================================

                            CERT-Renater

                Note d'Information No. 2025/VULN900
_____________________________________________________________________

DATE                : 23/12/2025

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Systems running IBM Security QRadar Analyst
                       Workflow versions prior to 3.0.1.

=====================================================================
https://www.ibm.com/support/pages/node/7255495
_____________________________________________________________________


Security Bulletin: Components with known vulnerabilities in IBM
Security QRadar Analyst Workflow for IBM QRadar SIEM


Security Bulletin

Summary

Multiple components with known vulnerabilities were addressed in a
IBM Security QRadar Analyst Workflow for IBM QRadar SIEM release
Vulnerability Details

CVEID:   CVE-2025-64756
DESCRIPTION:   Glob matches files using patterns the shell uses.
Starting in version 10.2.0 and prior to versions 10.5.0 and 11.1.0,
the glob CLI contains a command injection vulnerability in its
-c/--cmd option that allows arbitrary command execution when
processing files with malicious names. When glob -c are used, matched
filenames are passed to a shell with shell: true, enabling shell
metacharacters in filenames to trigger command injection and achieve
arbitrary code execution under the user or CI account privileges.
This issue has been patched in versions 10.5.0 and 11.1.0.
CWE:   CWE-78: Improper Neutralization of Special Elements used in
an OS Command ('OS Command Injection')
CVSS Source:   security-advisories@github.com
CVSS Base score:   7.5
CVSS Vector:   (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)

CVEID:   CVE-2025-55173
DESCRIPTION:   Next.js is a React framework for building full-stack
web applications. In versions before 14.2.31 and from 15.0.0 to before
15.4.5, Next.js Image Optimization is vulnerable to content injection.
The issue allowed attacker-controlled external image sources to
trigger file downloads with arbitrary content and filenames under
specific configurations. This behavior could be abused for phishing
or malicious file delivery. This vulnerability has been fixed in
Next.js versions 14.2.31 and 15.4.5.
CWE:   CWE-20: Improper Input Validation
CVSS Source:   security-advisories@github.com
CVSS Base score:   4.3
CVSS Vector:   (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N)

CVEID:   CVE-2025-57752
DESCRIPTION:   Next.js is a React framework for building full-stack web
applications. In versions before 14.2.31 and from 15.0.0 to before
15.4.5, Next.js Image Optimization API routes are affected by cache key
confusion. When images returned from API routes vary based on request
headers (such as Cookie or Authorization), these responses could be
incorrectly cached and served to unauthorized users due to a cache key
confusion bug. This vulnerability has been fixed in Next.js versions
14.2.31 and 15.4.5. All users are encouraged to upgrade if they use API
routes to serve images that depend on request headers and have image
optimization enabled.
CWE:   CWE-524: Use of Cache Containing Sensitive Information
CVSS Source:   security-advisories@github.com
CVSS Base score:   6.2
CVSS Vector:   (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)

CVEID:   CVE-2025-7783
DESCRIPTION:   Use of Insufficiently Random Values vulnerability in
form-data allows HTTP Parameter Pollution (HPP). This vulnerability is
associated with program files lib/form_data.Js. This issue affects
form-data: < 2.5.4, 3.0.0 - 3.0.3, 4.0.0 - 4.0.3.
CWE:   CWE-330: Use of Insufficiently Random Values
CVSS Source:   Harborist
CVSS Base score:   9.4
CVSS Vector:   (CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N)

CVEID:   CVE-2025-5889
DESCRIPTION:   A vulnerability was found in juliangruber brace-expansion
up to 1.1.11/2.0.1/3.0.0/4.0.0. It has been rated as problematic.
Affected by this issue is the function expand of the file index.js. The
manipulation leads to inefficient regular expression complexity. The
attack may be launched remotely. The complexity of an attack is rather
high. The exploitation is known to be difficult. The exploit has been
disclosed to the public and may be used. Upgrading to version 1.1.12,
2.0.2, 3.0.1 and 4.0.1 is able to address this issue. The name of the
patch is a5b98a4f30d7813266b221435e1eaaf25a1b0ac5. It is recommended
to upgrade the affected component.
CWE:   CWE-400: Uncontrolled Resource Consumption
CVSS Source:   cna@vuldb.com
CVSS Base score:   3.1
CVSS Vector:   (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L)

CVEID:   CVE-2025-54798
DESCRIPTION:   tmp is a temporary file and directory creator for node.js.
In versions 0.2.3 and below, tmp is vulnerable to an arbitrary temporary
file / directory write via symbolic link dir parameter. This is fixed in
version 0.2.4.
CWE:   CWE-59: Improper Link Resolution Before File Access ('Link Following')
CVSS Source:   NVD
CVSS Base score:   5.3
CVSS Vector:   (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)

CVEID:   CVE-2025-47279
DESCRIPTION:   Undici is an HTTP/1.1 client for Node.js. Prior to
versions 5.29.0, 6.21.2, and 7.5.0, applications that use undici to
implement a webhook-like system are vulnerable. If the attacker set
up a server with an invalid certificate, and they can force the
application to call the webhook repeatedly, then they can cause a
memory leak. This has been patched in versions 5.29.0, 6.21.2, and
7.5.0. As a workaound, avoid calling a webhook repeatedly if the
webhook fails.
CWE:   CWE-401: Missing Release of Memory after Effective Lifetime
CVSS Source:   security-advisories@github.com
CVSS Base score:   3.1
CVSS Vector:   (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L)

CVEID:   CVE-2025-29927
DESCRIPTION:   Next.js is a React framework for building full-stack
web applications. Starting in version 1.11.4 and prior to versions
12.3.5, 13.5.9, 14.2.25, and 15.2.3, it is possible to bypass
authorization checks within a Next.js application, if the authorization
check occurs in middleware. If patching to a safe version is
infeasible, it is recommend that you prevent external user requests
which contain the x-middleware-subrequest header from reaching your
Next.js application. This vulnerability is fixed in 12.3.5, 13.5.9,
14.2.25, and 15.2.3.
CWE:   CWE-285: Improper Authorization
CVSS Source:   security-advisories@github.com
CVSS Base score:   9.1
CVSS Vector:   (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N)

CVEID:   CVE-2025-55183
DESCRIPTION:   An information leak vulnerability exists in specific
configurations of React Server Components versions 19.0.0,
19.0.1 19.1.0, 19.1.1, 19.1.2, 19.2.0 and 19.2.1, including the
following packages: react-server-dom-parcel, react-server-dom-turbopack,
and react-server-dom-webpack. A specifically crafted HTTP request
sent to a vulnerable Server Function may unsafely return the source
code of any Server Function. Exploitation requires the existence of
a Server Function which explicitly or implicitly exposes a
stringified argument.
CVSS Source:   cve-assign@fb.com
CVSS Base score:   5.3
CVSS Vector:   (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)

CVEID:   CVE-2025-55184
DESCRIPTION:   A pre-authentication denial of service vulnerability
exists in React Server Components versions 19.0.0, 19.0.1 19.1.0,
19.1.1, 19.1.2, 19.2.0 and 19.2.1, including the following packages:
react-server-dom-parcel, react-server-dom-turbopack, and
react-server-dom-webpack. The vulnerable code unsafely deserializes
payloads from HTTP requests to Server Function endpoints, which can
cause an infinite loop that hangs the server process and may prevent
future HTTP requests from being served.
CWE:   CWE-502: Deserialization of Untrusted Data
CVSS Source:   cve-assign@fb.com
CVSS Base score:   7.5
CVSS Vector:   (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID:   CVE-2025-67779
DESCRIPTION:   It was found that the fix addressing CVE-2025-55184
in React Server Components was incomplete and does not prevent a
denial of service attack in a specific case. React Server Components
versions 19.0.2, 19.1.3 and 19.2.2 are affected, allowing unsafe
deserialization of payloads from HTTP requests to Server Function
endpoints. This can cause an infinite loop that hangs the server
process and may prevent future HTTP requests from being served.
CWE:   CWE-502: Deserialization of Untrusted Data
CVSS Source:   cve-assign@fb.com
CVSS Base score:   7.5
CVSS Vector:   (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)

CVEID:   CVE-2025-57822
DESCRIPTION:   Next.js is a React framework for building full-stack
web applications. Prior to versions 14.2.32 and 15.4.7, when next()
was used without explicitly passing the request object, it could lead
to SSRF in self-hosted applications that incorrectly forwarded
user-supplied headers. This vulnerability has been fixed in Next.js
versions 14.2.32 and 15.4.7. All users implementing custom middleware
logic in self-hosted environments are strongly encouraged to upgrade
and verify correct usage of the next() function.
CWE:   CWE-918: Server-Side Request Forgery (SSRF)
CVSS Source:   NVD
CVSS Base score:   8.2
CVSS Vector:   (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N)

CVEID:   CVE-2025-55182
DESCRIPTION:   A pre-authentication remote code execution vulnerability
exists in React Server Components versions 19.0.0, 19.1.0, 19.1.1, and
19.2.0 including the following packages: react-server-dom-parcel,
react-server-dom-turbopack, and react-server-dom-webpack. The vulnerable
code unsafely deserializes payloads from HTTP requests to Server
Function endpoints.
CWE:   CWE-502: Deserialization of Untrusted Data
CVSS Source:   cve-assign@fb.com
CVSS Base score:   10
CVSS Vector:   (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)

CVEID:   CVE-2025-9288
DESCRIPTION:   Improper Input Validation vulnerability in sha.js allows
Input Data Manipulation.This issue affects sha.js: through 2.4.11.
CWE:   CWE-20: Improper Input Validation
CVSS Source:   NVD
CVSS Base score:   9.1
CVSS Vector:   (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H)

CVEID:   CVE-2025-27789
DESCRIPTION:   Babel is a compiler for writing next generation JavaScript.
When using versions of Babel prior to 7.26.10 and 8.0.0-alpha.17 to
compile regular expression named capturing groups, Babel will generate a
polyfill for the `.replace` method that has quadratic complexity on some
specific replacement pattern strings (i.e. the second argument passed to
`.replace`). Generated code is vulnerable if all the following conditions
are true: Using Babel to compile regular expression named capturing groups,
using the `.replace` method on a regular expression that contains named
capturing groups, and the code using untrusted strings as the second
argument of `.replace`. This problem has been fixed in `@babel/helpers`
and `@babel/runtime` 7.26.10 and 8.0.0-alpha.17. It's likely that individual
users do not directly depend on `@babel/helpers`, and instead depend on
`@babel/core` (which itself depends on `@babel/helpers`). Upgrading to
`@babel/core` 7.26.10 is not required, but it guarantees use of a new
enough `@babel/helpers` version. Note that just updating Babel
dependencies is not enough; one will also need to re-compile the code.

No known workarounds are available.

CWE:   CWE-1333: Inefficient Regular Expression Complexity
CVSS Source:   security-advisories@github.com
CVSS Base score:   6.2
CVSS Vector:   (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)


Affected Products and Versions


Affected Product(s)	Version(s)
Analyst Workflow	2.32.0 - 3.0.0


Remediation/Fixes

IBM strongly encourages customers to update their systems promptly.

IBM Security QRadar Analyst Workflow 3.0.1 addresses these issues.


Workarounds and Mitigations

None


Get Notified about Future Security Bulletins

Subscribe to My Notifications to be notified of important product
support alerts like this.


References

Complete CVSS v3 Guide
On-line Calculator v3


Related Information

IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog


Acknowledgement

Change History

19 Dec 2025: Initial Publication

*The CVSS Environment Score is customer environment specific and will
ultimately impact the Overall CVSS Score. Customers can evaluate the
impact of this vulnerability in their environments by accessing the
links in the Reference section of this Security Bulletin.
Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST),
the Common Vulnerability Scoring System (CVSS) is an "industry open
standard designed to convey vulnerability severity and help to
determine urgency and priority of response." IBM PROVIDES THE
CVSS SCORES ""AS IS"" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE
IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY
ACTUAL OR POTENTIAL SECURITY VULNERABILITY. In addition to other
efforts to address potential vulnerabilities, IBM periodically
updates the record of components contained in our product offerings.
As part of that effort, if IBM identifies previously unidentified
packages in a product/service inventory, we address relevant
vulnerabilities regardless of CVE date. Inclusion of an older CVEID
does not demonstrate that the referenced product has been used by
IBM since that date, nor that IBM was aware of a vulnerability as
of that date. We are making clients aware of relevant vulnerabilities
as we become aware of them. "Affected Products and Versions"
referenced in IBM Security Bulletins are intended to be only products
and versions that are supported by IBM and have not passed their
end-of-support or warranty date. Thus, failure to reference
unsupported or extended-support products and versions in this
Security Bulletin does not constitute a determination by IBM that
they are unaffected by the vulnerability. Reference to one or more
unsupported versions in this Security Bulletin shall not create an
obligation for IBM to provide fixes for any unsupported or
extended-support products or versions.

=========================================================
+ CERT-RENATER        |    tel : 01-53-94-20-44         +
+ 23/25 Rue Daviel    |    fax : 01-53-94-20-41         +
+ 75013 Paris         |   email:cert@support.renater.fr +
=========================================================




