ID

VAR-201211-0316


CVE

CVE-2012-3315


TITLE

IBM TFIM and TFIMBG Vulnerabilities that bypass security restrictions

Trust: 0.8

sources: JVNDB: JVNDB-2012-005295

DESCRIPTION

The Java servlets in the management console in IBM Tivoli Federated Identity Manager (TFIM) through 6.2.2 and Tivoli Federated Identity Manager Business Gateway (TFIMBG) before 6.2.2 do not require authentication for all resource downloads, which allows remote attackers to bypass intended J2EE security constraints, and obtain sensitive information related to (1) federation metadata or (2) a web plugin configuration template, via a crafted request. IBM Tivoli Federated Identity Manager is prone to an access-bypass vulnerability. An attacker can exploit this issue to bypass certain security restrictions and gain access to certain sensitive data; this may aid in launching further attacks. IBM Tivoli Federated Identity Manager 6.1.1, 6.2.0, 6.2.1, and 6.2.2 are vulnerable. The product provides web and federated single sign-on (SSO) capabilities to users across multiple applications. ---------------------------------------------------------------------- The final version of the CSI 6.0 has been released. Find out why this is not just another Patch Management solution: http://secunia.com/blog/325/ ---------------------------------------------------------------------- TITLE: IBM Tivoli Federated Identity Manager Management Console Access Vulnerability SECUNIA ADVISORY ID: SA51163 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/51163/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=51163 RELEASE DATE: 2012-11-05 DISCUSS ADVISORY: http://secunia.com/advisories/51163/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/51163/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=51163 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: A vulnerability has been reported in IBM Tivoli Federated Identity Manager, which can be exploited by malicious people to bypass certain security restrictions. The vulnerability is reported in versions 6.1.1, 6.2.0, 6.2.1, and 6.2.2. SOLUTION: Apply patches (please see the vendor's advisory for details). PROVIDED AND/OR DISCOVERED BY: Reported by the vendor. ORIGINAL ADVISORY: IBM (IV26825, IV26826, IV26827): http://www.ibm.com/support/docview.wss?uid=swg21615770 http://www.ibm.com/support/docview.wss?uid=swg21615772 OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2012-3315 // JVNDB: JVNDB-2012-005295 // BID: 56391 // VULHUB: VHN-56596 // PACKETSTORM: 117876

AFFECTED PRODUCTS

vendor:ibmmodel:tivoli federated identity manager business gatewayscope:eqversion:6.1.1

Trust: 1.9

vendor:ibmmodel:tivoli federated identity managerscope:lteversion:6.2.2

Trust: 1.8

vendor:ibmmodel:tivoli federated identity manager business gatewayscope:eqversion:6.2.0.8

Trust: 1.6

vendor:ibmmodel:tivoli federated identity manager business gatewayscope:eqversion:6.2.0.2

Trust: 1.6

vendor:ibmmodel:tivoli federated identity manager business gatewayscope:eqversion:6.2.0

Trust: 1.6

vendor:ibmmodel:tivoli federated identity manager business gatewayscope:eqversion:6.2.0.3

Trust: 1.6

vendor:ibmmodel:tivoli federated identity managerscope:eqversion:6.2.0.9

Trust: 1.6

vendor:ibmmodel:tivoli federated identity managerscope:eqversion:6.2.0.8

Trust: 1.6

vendor:ibmmodel:tivoli federated identity manager business gatewayscope:eqversion:6.2.0.1

Trust: 1.6

vendor:ibmmodel:tivoli federated identity managerscope:eqversion:6.2.0.3

Trust: 1.6

vendor:ibmmodel:tivoli federated identity managerscope:eqversion:6.1.1

Trust: 1.0

vendor:ibmmodel:tivoli federated identity managerscope:eqversion:6.2.0.2

Trust: 1.0

vendor:ibmmodel:tivoli federated identity manager business gatewayscope:lteversion:6.2.1

Trust: 1.0

vendor:ibmmodel:tivoli federated identity managerscope:eqversion:6.2.0.1

Trust: 1.0

vendor:ibmmodel:tivoli federated identity managerscope:eqversion:6.2.1

Trust: 1.0

vendor:ibmmodel:tivoli federated identity managerscope:eqversion:6.2.0

Trust: 1.0

vendor:ibmmodel:tivoli federated identity manager business gatewayscope:eqversion:6.2.1

Trust: 0.9

vendor:ibmmodel:tivoli federated identity manager business gatewayscope:ltversion:6.2.2

Trust: 0.8

vendor:ibmmodel:tivoli federated identity manager business gatewayscope:eqversion:6.2

Trust: 0.3

vendor:ibmmodel:tivoli federated identity managerscope:eqversion:6.2

Trust: 0.3

sources: BID: 56391 // JVNDB: JVNDB-2012-005295 // CNNVD: CNNVD-201211-097 // NVD: CVE-2012-3315

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2012-3315
value: MEDIUM

Trust: 1.0

NVD: CVE-2012-3315
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201211-097
value: MEDIUM

Trust: 0.6

VULHUB: VHN-56596
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2012-3315
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-56596
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-56596 // JVNDB: JVNDB-2012-005295 // CNNVD: CNNVD-201211-097 // NVD: CVE-2012-3315

PROBLEMTYPE DATA

problemtype:CWE-287

Trust: 1.9

sources: VULHUB: VHN-56596 // JVNDB: JVNDB-2012-005295 // NVD: CVE-2012-3315

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201211-097

TYPE

authorization issue

Trust: 0.6

sources: CNNVD: CNNVD-201211-097

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-005295

PATCH

title:1615772url:http://www-01.ibm.com/support/docview.wss?uid=swg21615772

Trust: 0.8

title:1615770url:http://www-01.ibm.com/support/docview.wss?uid=swg21615770

Trust: 0.8

sources: JVNDB: JVNDB-2012-005295

EXTERNAL IDS

db:NVDid:CVE-2012-3315

Trust: 2.8

db:SECUNIAid:51163

Trust: 1.8

db:JVNDBid:JVNDB-2012-005295

Trust: 0.8

db:CNNVDid:CNNVD-201211-097

Trust: 0.7

db:AIXAPARid:IV26827

Trust: 0.6

db:AIXAPARid:IV26825

Trust: 0.6

db:AIXAPARid:IV26826

Trust: 0.6

db:XFid:77796

Trust: 0.6

db:BIDid:56391

Trust: 0.4

db:VULHUBid:VHN-56596

Trust: 0.1

db:PACKETSTORMid:117876

Trust: 0.1

sources: VULHUB: VHN-56596 // BID: 56391 // JVNDB: JVNDB-2012-005295 // PACKETSTORM: 117876 // CNNVD: CNNVD-201211-097 // NVD: CVE-2012-3315

REFERENCES

url:http://www-01.ibm.com/support/docview.wss?uid=swg21615770

Trust: 2.0

url:http://www-01.ibm.com/support/docview.wss?uid=swg21615772

Trust: 2.0

url:http://www-01.ibm.com/support/docview.wss?uid=swg1iv26825

Trust: 1.7

url:http://www-01.ibm.com/support/docview.wss?uid=swg1iv26826

Trust: 1.7

url:http://www-01.ibm.com/support/docview.wss?uid=swg1iv26827

Trust: 1.7

url:http://secunia.com/advisories/51163

Trust: 1.7

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/77796

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-3315

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-3315

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/77796

Trust: 0.6

url:http://www.ibm.com/

Trust: 0.3

url:http://www-01.ibm.com/software/tivoli/products/federated-identity-mgr/

Trust: 0.3

url:http://www.ibm.com/support/docview.wss?uid=swg21615770

Trust: 0.1

url:http://secunia.com/advisories/51163/#comments

Trust: 0.1

url:http://www.ibm.com/support/docview.wss?uid=swg21615772

Trust: 0.1

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=51163

Trust: 0.1

url:http://secunia.com/advisories/51163/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/blog/325/

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-56596 // BID: 56391 // JVNDB: JVNDB-2012-005295 // PACKETSTORM: 117876 // CNNVD: CNNVD-201211-097 // NVD: CVE-2012-3315

CREDITS

The vendor reported this issue

Trust: 0.3

sources: BID: 56391

SOURCES

db:VULHUBid:VHN-56596
db:BIDid:56391
db:JVNDBid:JVNDB-2012-005295
db:PACKETSTORMid:117876
db:CNNVDid:CNNVD-201211-097
db:NVDid:CVE-2012-3315

LAST UPDATE DATE

2024-11-23T22:42:41.548000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-56596date:2017-08-29T00:00:00
db:BIDid:56391date:2012-11-05T00:00:00
db:JVNDBid:JVNDB-2012-005295date:2012-11-09T00:00:00
db:CNNVDid:CNNVD-201211-097date:2012-11-09T00:00:00
db:NVDid:CVE-2012-3315date:2024-11-21T01:40:37.960

SOURCES RELEASE DATE

db:VULHUBid:VHN-56596date:2012-11-08T00:00:00
db:BIDid:56391date:2012-11-05T00:00:00
db:JVNDBid:JVNDB-2012-005295date:2012-11-09T00:00:00
db:PACKETSTORMid:117876date:2012-11-05T07:28:40
db:CNNVDid:CNNVD-201211-097date:2012-11-07T00:00:00
db:NVDid:CVE-2012-3315date:2012-11-08T11:46:23.830