IBM Support

Rational Service Tester Open Source OpenSAML XML Information Disclosure (CVE-2013-6440)

Security Bulletin


Summary

A potential security vulnerability exists in IBM Rational Service Tester related to OpenSAML. OpenSAML could allow a remote authenticated attacker to obtain sensitive information, caused by an error when parsing XML entities. By persuading a victim to open a specially-crafted XML document containing external entity references, an attacker could exploit this vulnerability to obtain sensitive information. The vulnerability has been eliminated in the latest version of IBM Rational Service Tester.

Vulnerability Details

Subscribe to My Notifications to be notified of important product support alerts like this.
  • Follow this link for more information (requires login with your IBM ID)

CVE ID: CVE-2013-6440

Description: OpenSAML could allow a remote authenticated attacker to obtain sensitive information, caused by an error when parsing XML entities.

CVSS Base Score: 4.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/89714 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:S/C:N/I:P/A:N)

Affected Products and Versions

Rational Service Tester versions 8.2.x, 8.3.x, 8.5.x.

Workarounds and Mitigations

The workaround for version 8.5.x:

  1. Locate the following jars (opensaml-2.5.1-1.jar and opensaml-1.1.jar) in the installation directories of the product for the plugins com.ibm.rational.ttt.common.models.core.

    For example:
    C:\IBM\IBMIMShared\plugins\com.ibm.rational.ttt.common.models.core_8.3.0.v20120926_1424\lib\open\security

  2. Delete the two jars

  3. Download the jar opensaml-2.6.1.jar (http://shibboleth.net/downloads/java-opensaml/)

  4. Rename to opensaml-2.5.1-1.jar

  5. Place if into the installation directory in which the two previous jars were located.



The workaround for versions 8.2 / 8.2.1 / 8.3.x

  1. Locate the following jars (opensaml-2.2.3.jar and opensaml-1.1.jar) in the installation directories of the product for the plugins com.ibm.rational.ttt.common.models.core.

    For example:
    C:\IBM\IBMIMShared\plugins\com.ibm.rational.ttt.common.models.core_8.3.0.v20120926_1424\lib\open\security

  2. Delete the two jars.

  3. Download the jar opensaml-2.6.1.jar (http://shibboleth.net/downloads/java-opensaml/)

  4. Rename to opensaml-2.2.3.jar

  5. Place if into the installation directory in which the two previous jars were located.

Get Notified about Future Security Bulletins

References

Off

Acknowledgement

None

Change History

* 28 Februrary 2014: Original copy published

*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.

Disclaimer

Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.

[{"Product":{"code":"SSNKWF","label":"IBM Rational Service Tester for SOA Quality"},"Business Unit":{"code":"BU053","label":"Cloud & Data Platform"},"Component":"Integrations: 3rd Party","Platform":[{"code":"PF016","label":"Linux"},{"code":"PF033","label":"Windows"}],"Version":"8.2;8.2.0.1;8.2.0.2;8.2.0.3;8.2.0.4;8.2.0.5;8.2.0.6;8.2.1;8.2.1.1;8.2.1.2;8.2.1.3;8.2.1.4;8.2.1.5;8.3;8.3.0.1;8.3.0.2;8.3.0.3;8.5;8.5.0.1;8.5.0.2;8.5.1;8.5.1.1","Edition":"","Line of Business":{"code":"LOB45","label":"Automation"}}]

Document Information

Modified date:
16 June 2018

UID

swg21662668