SB2022091313 - Multiple vulnerabilities in IBM Planning Analytics Local



SB2022091313 - Multiple vulnerabilities in IBM Planning Analytics Local

Published: September 13, 2022 Updated: February 11, 2025

Security Bulletin ID SB2022091313
Severity
High
Patch available
YES
Number of vulnerabilities 19
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

High 21% Medium 47% Low 32%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 19 secuirty vulnerabilities.


1) Inconsistent interpretation of HTTP requests (CVE-ID: CVE-2021-21409)

The vulnerability allows a remote attacker to preform HTTP request smuggling attacks.

The vulnerability exists due to improper validation of HTTP requests in io.netty:netty-codec-http2 in Netty, if the request only uses a single Http2HeaderFrame with the endStream set to to true. A remote attacker can send a specially crafted HTTP request to the server and smuggle arbitrary HTTP headers.

Successful exploitation of vulnerability may allow an attacker to poison HTTP cache and perform phishing attacks.


2) Improper Authentication (CVE-ID: CVE-2020-1957)

The vulnerability allows a remote attacker to bypass authentication process.

The vulnerability exists due to an authentication bypass when using Apache Shiro with Spring dynamic controllers. A remote attacker can send a specially crafted request and bypass authentication process.


3) Improper Authentication (CVE-ID: CVE-2020-17523)

The vulnerability allows a remote attacker to bypass authentication process.

The vulnerability exists due to an error in when processing authentication requests in Apache Shiro with Spring. A remote attacker can send a specially crafted HTTP request to bypass authentication process and gain unauthorized access to the application.


4) Improper Authentication (CVE-ID: CVE-2020-17510)

The vulnerability allows a remote attacker to bypass authentication process.

The vulnerability exists due to an error when using Apache Shiro with Spring. A remote attacker can send a specially crfated HTTP request, bypass authentication process and gain unauthorized access to the application.


5) Improper Authentication (CVE-ID: CVE-2020-13933)

The vulnerability allows a remote attacker to bypass authentication process.

The vulnerability exists due to an error in when processing authentication requests. A remote attacker can send a specially crafted HTTP request, bypass authentication process and gain unauthorized access to the application.


6) Improper Authentication (CVE-ID: CVE-2020-11989)

The vulnerability allows a remote attacker to bypass authentication process.

The vulnerability exists due to an error in when processing authentication requests in Apache Shiro with Spring dynamic controllers. A remote attacker can bypass authentication process and gain unauthorized access to the application.


7) Cryptographic issues (CVE-ID: CVE-2019-12422)

The vulnerability allows a remote attacker to perform a padding attack.

The vulnerability exists due to using the default "remember me" configuration. A remote attacker can perform a padding attack on cookies and gain sensitive information on the target system.


8) Improper access control (CVE-ID: CVE-2016-4437)

The vulnerability allows a remote attacker to execute arbitrary code or bypass intended access restrictions.

The vulnerability exists due to improper access restrictions when a cipher key is not been configured for the "remember me" feature. A remote attacker can bypass implemented security restrictions and gain unauthorized access to the application.


9) Improper access control (CVE-ID: CVE-2019-0201)

The vulnerability allows a remote attacker to gain unauthorized access to sensitive information.

The vulnerability exists due to improper access restrictions when "getACL()" command doesn’t check any permission when retrieves the ACLs of the requested node and returns all information contained in the ACL Id field as plaintext string. A remote attacker can gain READ permissions to list ACL.


10) Improper access control (CVE-ID: CVE-2017-5637)

The vulnerability allows a local user to perform a denial of service attack.

The vulnerability exists due to improper access constrictions to wchp/wchc service. A local user can consume all available CPU resource and perform denial of service (DoS) attack.

11) Cleartext storage of sensitive information (CVE-ID: CVE-2021-21290)

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to insecure usage of temporary files in AbstractDiskHttpData method in Netty. The application stores sensitive information in temporary file that has insecure permissions. A local user can view application's temporary file and gain access to potentially sensitive data.

12) HTTP response splitting (CVE-ID: CVE-2019-20445)

The vulnerability allows a remote attacker to perform HTTP splitting attacks.

The vulnerability exists due to software does not corrector process CRLF character sequences within the HttpObjectDecoder.java in Netty, which allows a Content-Length header to be accompanied by a second Content-Length header, or by a Transfer-Encoding header. A remote attacker can send specially crafted request containing CRLF sequence and make the application to send a split HTTP response.

Successful exploitation of the vulnerability may allow an attacker perform cache poisoning attack.


13) Inconsistent interpretation of HTTP requests (CVE-ID: CVE-2019-20444)

The vulnerability allows a remote attacker to perform HTTP request smuggling attacks.

The vulnerability exists due to incorrect processing of HTTP headers without the colon within the HttpObjectDecoder.java file in Netty. A remote attacker can send a specially crafted HTTP request to the application and perform HTTP request smuggling attack.


14) Inconsistent interpretation of HTTP requests (CVE-ID: CVE-2019-16869)

The vulnerability allows a remote attacker to perform HTTP request smuggling attack.

The vulnerability exists due to improper input validation when processing a whitespace before the colon in HTTP headers (e.g. "Transfer-Encoding : chunked"). A remote attacker can send a specially crafted HTTP request and perform HTTP request smuggling attack.


15) Out-of-bounds read (CVE-ID: CVE-2021-22918)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition in uv__idna_toascii() function in libuv, which is used to convert strings to ASCII. A remote attacker can force the application to resolve a specially crafted hostname, trigger an out-of-bounds read error and gain access to sensitive information or perform a denial of service (DoS) attack.


16) Incorrect default permissions (CVE-ID: CVE-2021-22921)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists in Windows installer due to incorrect default permissions for files and folders that are set by the application. A local user with access to the system can view contents of files and directories or modify them.


17) Buffer overflow (CVE-ID: CVE-2016-5017)

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

Buffer overflow in the C cli shell in Apache Zookeeper before 3.4.9 and 3.5.x before 3.5.3, when using the "cmd:" batch mode syntax, allows attackers to have unspecified impact via a long command string.


18) Improper authentication (CVE-ID: CVE-2018-8012)

The vulnerability allows a remote attacker to bypass authentication and write arbitrary files on the target system.

The weakness exists due to missing authentication to join a quorum. A remote attacker can bypass authentication, join the cluster and propagate changes to the cluster leader.

19) Protection mechanism failure (CVE-ID: CVE-2019-10086)

The vulnerability allows a remote attacker to bypass certain security restrictions.

The vulnerability exist due to Beanutils is not using by default the a special BeanIntrospector class in PropertyUtilsBean that was supposed to suppress the ability for an attacker to access the classloader via the class property available on all Java objects. A remote attacker can abuse such application behavior against applications that were developed to rely on this security feature.


Remediation

Install update from vendor's website.