CVE-2024-22319

8.1 HIGH

📋 TL;DR

This CVE describes a JNDI injection vulnerability in IBM Operational Decision Manager that allows remote attackers to execute arbitrary code by passing malicious arguments to a specific API. The vulnerability affects multiple versions of IBM ODM 8.10.3 through 8.12.0.1. Attackers can exploit this to gain control of affected systems.

💻 Affected Systems

Products:
  • IBM Operational Decision Manager
Versions: 8.10.3, 8.10.4, 8.10.5.1, 8.11, 8.11.0.1, 8.11.1, 8.12.0.1
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the specific API endpoint that processes JNDI lookups without proper input validation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full administrative control, data exfiltration, and lateral movement within the network.

🟠

Likely Case

Remote code execution leading to installation of malware, backdoors, or ransomware on vulnerable ODM servers.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing exploitation attempts.

🌐 Internet-Facing: HIGH - Directly exploitable via API calls without authentication in default configurations.
🏢 Internal Only: HIGH - Internal attackers or compromised internal systems can exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

JNDI injection vulnerabilities are well-understood and frequently weaponized. The vulnerability requires no authentication in default configurations.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply interim fix or upgrade to versions beyond those listed

Vendor Advisory: https://www.ibm.com/support/pages/node/7112382

Restart Required: Yes

Instructions:

1. Review IBM advisory for specific patch details. 2. Apply the interim fix provided by IBM. 3. Restart the ODM application server. 4. Verify the fix is applied.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict network access to ODM API endpoints to only trusted sources

Use firewall rules to limit access to ODM ports (typically 9080, 9443)

Input Validation Enhancement

all

Implement additional input validation for the affected API endpoint

Configure ODM to validate and sanitize all JNDI lookup parameters

🧯 If You Can't Patch

  • Isolate vulnerable ODM instances in a separate network segment with strict access controls
  • Implement web application firewall (WAF) rules to block JNDI injection patterns

🔍 How to Verify

Check if Vulnerable:

Check ODM version against affected versions list. Review application logs for JNDI lookup attempts.

Check Version:

Check ODM installation directory for version information or use IBM Installation Manager

Verify Fix Applied:

Verify ODM version is updated beyond affected versions. Test the specific API endpoint with controlled JNDI lookups.

📡 Detection & Monitoring

Log Indicators:

  • Unusual JNDI lookup patterns in ODM logs
  • Unexpected process execution from ODM context
  • Suspicious network connections from ODM server

Network Indicators:

  • Outbound LDAP/RMI connections from ODM server to untrusted sources
  • Unusual API calls to the vulnerable endpoint

SIEM Query:

source="odm.log" AND ("JNDI" OR "lookup") AND (suspicious_pattern)

🔗 References

📤 Share & Export