SB2024112517 - Multiple vulnerabilities in IBM QRadar Pre-Validation App



SB2024112517 - Multiple vulnerabilities in IBM QRadar Pre-Validation App

Published: November 25, 2024 Updated: April 4, 2025

Security Bulletin ID SB2024112517
Severity
Medium
Patch available
YES
Number of vulnerabilities 6
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

Medium 67% Low 33%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 6 secuirty vulnerabilities.


1) Server-Side Request Forgery (SSRF) (CVE-ID: CVE-2024-34351)

The disclosed vulnerability allows a remote attacker to perform SSRF attacks.

The vulnerability exists due to insufficient validation of user-supplied input in Next.js Server Actions. A remote attacker can send a specially crafted HTTP request with a modified Host header and trick the application to initiate requests to arbitrary systems.

Successful exploitation of this vulnerability may allow a remote attacker gain access to sensitive data, located in the local network or send malicious requests to other servers from the vulnerable system.


2) Server-Side Request Forgery (SSRF) (CVE-ID: CVE-2024-39338)

The disclosed vulnerability allows a remote attacker to perform SSRF attacks.

The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can send a specially crafted HTTP request and trick the application to initiate requests to arbitrary systems.

Successful exploitation of this vulnerability may allow a remote attacker gain access to sensitive data, located in the local network or send malicious requests to other servers from the vulnerable system.


3) Resource exhaustion (CVE-ID: CVE-2024-47831)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to application does not properly control consumption of internal resources within the image optimization feature. A remote attacker can trigger resource exhaustion and perform a denial of service (DoS) attack.


4) Acceptance of extraneous untrusted data with trusted data (CVE-ID: CVE-2024-46982)

The vulnerability allows a remote attacker to perform spoofing attack.

The vulnerability exists due to improper input validation when handling HTTP request. A remote non-authenticated attacker can poison the cache of a non-dynamic server-side rendered route in the pages router.


5) Open redirect (CVE-ID: CVE-2023-26159)

The vulnerability allows a remote attacker to redirect victims to arbitrary URL.

The vulnerability exists due to improper sanitization of user-supplied data within the url.parse() function. A remote attacker can create a link that leads to a trusted website, however, when clicked, redirects the victim to arbitrary domain.

Successful exploitation of this vulnerability may allow a remote attacker to perform a phishing attack and steal potentially sensitive information.


6) Information disclosure (CVE-ID: CVE-2024-28849)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to credentials are shared via headers when following cross-domain redirects. A remote attacker can gain access to sensitive information.


Remediation

Install update from vendor's website.