CVE-2016-9716

8.8 HIGH

📋 TL;DR

This CVE describes a cross-site request forgery (CSRF) vulnerability in IBM InfoSphere Master Data Management Server. Attackers can trick authenticated users into performing unauthorized actions on the MDM server. Affected versions include 11.0 through 11.6.

💻 Affected Systems

Products:
  • IBM InfoSphere Master Data Management Server
Versions: 11.0, 11.3, 11.4, 11.5, 11.6
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments with web interface enabled are vulnerable

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the MDM system including data manipulation, privilege escalation, or administrative takeover

🟠

Likely Case

Unauthorized data modification, user account compromise, or configuration changes

🟢

If Mitigated

Limited impact with proper CSRF protections and user awareness

🌐 Internet-Facing: HIGH - Web applications exposed to internet are primary attack vectors
🏢 Internal Only: MEDIUM - Internal users could still be targeted via phishing or compromised internal sites

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

CSRF attacks are well-understood and easy to implement; requires user interaction

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply fixes per IBM security bulletin

Vendor Advisory: http://www.ibm.com/support/docview.wss?uid=swg22006610

Restart Required: Yes

Instructions:

1. Review IBM security bulletin 2. Download appropriate fix pack 3. Apply fix following IBM installation procedures 4. Restart MDM services

🔧 Temporary Workarounds

Implement CSRF Tokens

all

Add anti-CSRF tokens to all forms and state-changing requests

SameSite Cookie Attribute

all

Set SameSite=Strict or Lax on session cookies

🧯 If You Can't Patch

  • Implement web application firewall with CSRF protection rules
  • Educate users about phishing risks and implement multi-factor authentication

🔍 How to Verify

Check if Vulnerable:

Check version against affected list and test for CSRF vulnerabilities using tools like OWASP ZAP or Burp Suite

Check Version:

Check MDM server version through admin console or configuration files

Verify Fix Applied:

Verify fix pack installation and test CSRF protections are working

📡 Detection & Monitoring

Log Indicators:

  • Unexpected state changes without corresponding user actions
  • Multiple requests from same user with different referrers

Network Indicators:

  • Requests with missing or invalid CSRF tokens
  • Requests with suspicious referrer headers

SIEM Query:

web_requests WHERE (referrer NOT LIKE '%trusted-domain%' AND method IN ('POST', 'PUT', 'DELETE'))

🔗 References

📤 Share & Export