DataPower services like XML Firewall, Multi Protocol Gateway, Web Service Proxy and Web Token Service when configured to blindly echo requests could result in potential security vulnerability in production environments.
For the purposes of debugging, DataPower provides configuration options to echo requests received from the client. For example, XML Firewall service can be configured to echo requests by choosing the backend as ‘loopback’. Other services like Multi Protocol Gateway and Web Service Proxy can be configured to echo requests by setting the variable “var://service/mpgw/skip-backside” in its processing policy.
CVSS Base Score: 2.6
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/82221 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:H/Au:N/C:N/I:P/A:N)
AFFECTED PRODUCTS AND VERSIONS:
WebSphere DataPower – All versions.
The vulnerability can be prevented by not enabling the services to blindly echo requests back.
For example, if XML Firewall is configured with ‘loopback’ as the backend or other services like MPGW and Web Service Proxy are configured to skip backside, an explicit fetch action can be configured in its processing policy to fetch a static file and use that as the response. This way the requests received from the client will not get echoed back as is to the clients.
· Complete CVSS Guide
· On-line Calculator V2
· X-Force Vulnerability Database http://xforce.iss.net/xforce/xfdb/82221
IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog
The vulnerability was reported by:
SEC Consult Vulnerability Lab
17 May 2013: Original Copy Published
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Flash.
Note: According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.