CVE-2023-38012

5.3 MEDIUM

📋 TL;DR

This vulnerability allows remote attackers to perform directory traversal attacks on IBM Cloud Pak System. By sending specially crafted URLs containing 'dot dot' sequences (/../), attackers can access arbitrary files on the system. Affected versions include IBM Cloud Pak System 2.3.3.6 through 2.3.4.0.

💻 Affected Systems

Products:
  • IBM Cloud Pak System
Versions: 2.3.3.6, 2.3.3.6 iFix1, 2.3.3.6 iFix2, 2.3.3.7, 2.3.3.7 iFix1, 2.3.4.0
Operating Systems: Not OS-specific - affects IBM Cloud Pak System software
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through access to sensitive configuration files, credentials, or system files leading to privilege escalation or data exfiltration.

🟠

Likely Case

Unauthorized access to sensitive files containing configuration data, logs, or credentials that could enable further attacks.

🟢

If Mitigated

Limited file access restricted by file permissions and system hardening, preventing access to critical system files.

🌐 Internet-Facing: HIGH - Directory traversal vulnerabilities in internet-facing systems allow remote attackers to exploit without network access.
🏢 Internal Only: MEDIUM - Internal attackers could still exploit, but requires network access to the vulnerable system.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Directory traversal attacks are well-understood and easy to execute. No authentication required for exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply interim fix or upgrade to version 2.3.4.1 or later

Vendor Advisory: https://www.ibm.com/support/pages/node/7148474

Restart Required: Yes

Instructions:

1. Review IBM advisory at provided URL. 2. Apply recommended interim fix for your version. 3. Restart affected services. 4. Consider upgrading to version 2.3.4.1 or later.

🔧 Temporary Workarounds

Web Application Firewall (WAF) Rules

all

Implement WAF rules to block URL requests containing directory traversal patterns

Network Segmentation

all

Restrict network access to IBM Cloud Pak System to only trusted sources

🧯 If You Can't Patch

  • Implement strict network access controls to limit exposure
  • Deploy web application firewall with directory traversal detection rules

🔍 How to Verify

Check if Vulnerable:

Check IBM Cloud Pak System version against affected versions list. Test with controlled directory traversal attempts.

Check Version:

Check IBM Cloud Pak System administration console or documentation for version information

Verify Fix Applied:

After patching, attempt directory traversal attacks to confirm they are blocked. Verify version is updated.

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests containing '/../' patterns
  • Unusual file access patterns from web requests
  • Failed file access attempts outside expected directories

Network Indicators:

  • HTTP requests with encoded directory traversal sequences
  • Multiple failed file access attempts

SIEM Query:

web.url:*../* OR web.url:*%2e%2e%2f*

🔗 References

📤 Share & Export