CVE-2024-22349

4.0 MEDIUM

📋 TL;DR

This vulnerability in IBM DevOps Velocity and UrbanCode Velocity allows local web pages to be stored insecurely, enabling other users on the same system to read them. It affects users of these products who have local access to the system where the software is installed. The issue stems from improper web cache management that exposes sensitive information.

💻 Affected Systems

Products:
  • IBM DevOps Velocity
  • IBM UrbanCode Velocity
Versions: IBM DevOps Velocity 5.0.0; IBM UrbanCode Velocity 4.0.0 through 4.0.25
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Affects default installations; requires local user access to the system where the software is running.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated local user could access sensitive web pages containing configuration data, credentials, or other proprietary information stored by the application.

🟠

Likely Case

Local users with standard privileges could read cached web pages that might contain session data or application state information.

🟢

If Mitigated

With proper access controls and isolation, only authorized users can access the system, limiting exposure to trusted personnel.

🌐 Internet-Facing: LOW - This is a local information disclosure vulnerability requiring local system access.
🏢 Internal Only: MEDIUM - Internal users with local access could potentially access sensitive cached web data.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access to the system; no authentication bypass needed for local users.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: IBM DevOps Velocity 5.0.0.1; IBM UrbanCode Velocity 4.0.26

Vendor Advisory: https://www.ibm.com/support/pages/node/7172750

Restart Required: Yes

Instructions:

1. Download the fix from IBM Fix Central. 2. Backup your current installation. 3. Apply the patch according to IBM documentation. 4. Restart the application services.

🔧 Temporary Workarounds

Restrict local user access

all

Limit local user access to systems running vulnerable versions

Clear web cache regularly

linux

Implement scheduled cleanup of web cache directories

rm -rf /path/to/velocity/web/cache/*

🧯 If You Can't Patch

  • Implement strict access controls to limit local user access to the system
  • Monitor for unusual local file access patterns and audit local user activities

🔍 How to Verify

Check if Vulnerable:

Check the installed version of IBM DevOps Velocity or UrbanCode Velocity against affected versions

Check Version:

Check the application's About section or configuration files for version information

Verify Fix Applied:

Verify the version is updated to 5.0.0.1 for DevOps Velocity or 4.0.26 for UrbanCode Velocity

📡 Detection & Monitoring

Log Indicators:

  • Unusual local file access patterns to web cache directories
  • Multiple failed attempts to access restricted directories

Network Indicators:

  • Not applicable - local vulnerability

SIEM Query:

source="*system_logs*" AND (event="file_access" AND path="*/web/cache/*")

🔗 References

📤 Share & Export