CVE-2023-35899

7.0 HIGH

📋 TL;DR

This CVE describes a CSV injection vulnerability in IBM Cloud Pak for Automation that allows remote attackers to execute arbitrary commands on affected systems. The vulnerability occurs due to improper validation of CSV file contents, potentially enabling command injection attacks. Organizations running affected versions of IBM Cloud Pak for Automation are at risk.

💻 Affected Systems

Products:
  • IBM Cloud Pak for Automation
Versions: 18.0.0, 18.0.1, 18.0.2, 19.0.1, 19.0.2, 19.0.3, 20.0.1, 20.0.2, 20.0.3, 21.0.1, 21.0.2, 21.0.3, 22.0.1, 22.0.2
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments with CSV import functionality are affected. The vulnerability requires the ability to upload CSV files.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote attacker gains full system control, executes arbitrary commands, and potentially compromises the entire Cloud Pak deployment and underlying infrastructure.

🟠

Likely Case

Attacker executes limited commands within the application context, potentially accessing sensitive data, modifying configurations, or establishing persistence.

🟢

If Mitigated

With proper input validation and security controls, the attack would be blocked at the application layer with no impact.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires the ability to upload CSV files to the application. The vulnerability is well-documented in security literature.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply fixes as specified in IBM Security Bulletin

Vendor Advisory: https://www.ibm.com/support/pages/node/7030357

Restart Required: Yes

Instructions:

1. Review IBM Security Bulletin. 2. Apply appropriate fix or upgrade to patched version. 3. Restart affected services. 4. Verify the fix is applied.

🔧 Temporary Workarounds

Input Validation Enhancement

all

Implement strict input validation for CSV file uploads to sanitize potentially malicious content

Access Control Restriction

all

Restrict CSV upload functionality to trusted users only and implement file type validation

🧯 If You Can't Patch

  • Disable CSV import functionality entirely if not required
  • Implement network segmentation to isolate affected systems and restrict access

🔍 How to Verify

Check if Vulnerable:

Check if running affected versions of IBM Cloud Pak for Automation and if CSV import functionality is enabled

Check Version:

oc get pods -n <namespace> | grep automation

Verify Fix Applied:

Verify patch version is applied and test CSV import functionality with malicious payloads

📡 Detection & Monitoring

Log Indicators:

  • Unusual CSV file uploads
  • Command execution attempts in application logs
  • Unexpected process creation

Network Indicators:

  • Suspicious outbound connections from application servers
  • Unexpected command and control traffic

SIEM Query:

source="ibm-cloud-pak" AND (csv_upload OR command_execution)

🔗 References

📤 Share & Export