CVE-2021-29756

8.8 HIGH

📋 TL;DR

This CSRF vulnerability in IBM Cognos Analytics allows attackers to trick authenticated users into performing unauthorized actions on the My Inbox page. It affects IBM Cognos Analytics 11.1.7 and 11.2.0 installations, potentially enabling attackers to manipulate data or perform administrative functions through the victim's session.

💻 Affected Systems

Products:
  • IBM Cognos Analytics
Versions: 11.1.7 and 11.2.0
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the My Inbox page specifically; requires user authentication to exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker could manipulate or delete critical business data, modify user permissions, or perform administrative actions leading to data breach or system compromise.

🟠

Likely Case

Attacker could trick users into performing unwanted actions like modifying reports, changing configurations, or accessing unauthorized data.

🟢

If Mitigated

With proper CSRF protections and user awareness, impact is limited to unsuccessful attack attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

CSRF attacks typically require user interaction but are straightforward to implement once the vulnerable endpoint is identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply security updates as per IBM advisory

Vendor Advisory: https://www.ibm.com/support/pages/node/6520510

Restart Required: Yes

Instructions:

1. Review IBM advisory 2. Apply recommended security updates 3. Restart Cognos services 4. Verify fix implementation

🔧 Temporary Workarounds

Implement CSRF Tokens

all

Add anti-CSRF tokens to forms and validate them server-side

SameSite Cookie Attribute

all

Set SameSite=Strict or Lax attributes on session cookies

🧯 If You Can't Patch

  • Implement web application firewall with CSRF protection rules
  • Educate users about CSRF risks and safe browsing practices

🔍 How to Verify

Check if Vulnerable:

Check if running affected versions (11.1.7 or 11.2.0) and test My Inbox page for CSRF protections

Check Version:

Check Cognos Administration console or installation logs for version information

Verify Fix Applied:

Verify updated version and test CSRF protections on My Inbox page

📡 Detection & Monitoring

Log Indicators:

  • Unusual requests to My Inbox endpoints from unexpected referrers
  • Multiple failed state-changing operations

Network Indicators:

  • Requests with missing or invalid anti-CSRF tokens
  • Cross-origin requests to My Inbox endpoints

SIEM Query:

source="cognos.log" AND (uri="/myinbox" OR uri="/inbox") AND referer NOT CONTAINS "expected-domain.com"

🔗 References

📤 Share & Export