CVE-2024-28778

6.5 MEDIUM

📋 TL;DR

This vulnerability exposes Artifactory API keys in IBM Cognos Controller and IBM Controller, allowing authenticated users to publish code to private packages or repositories under the organization's name. It affects IBM Cognos Controller versions 11.0.0 through 11.0.1 and IBM Controller 11.1.0. The issue stems from hardcoded credentials (CWE-798).

💻 Affected Systems

Products:
  • IBM Cognos Controller
  • IBM Controller
Versions: IBM Cognos Controller 11.0.0 through 11.0.1, IBM Controller 11.1.0
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the affected IBM Controller systems.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Malicious actors could publish malicious code to private repositories, potentially compromising downstream systems that use these packages, leading to supply chain attacks or unauthorized code execution.

🟠

Likely Case

Insiders or compromised accounts could publish unauthorized code to organizational repositories, potentially introducing vulnerabilities or backdoors into internal software.

🟢

If Mitigated

With proper access controls and monitoring, unauthorized publishing attempts would be detected and blocked, limiting impact to audit trail issues.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access to the vulnerable system. The vulnerability involves exposure of API keys that could be used to interact with Artifactory repositories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply fix as described in IBM Security Bulletin

Vendor Advisory: https://www.ibm.com/support/pages/node/7179163

Restart Required: Yes

Instructions:

1. Review IBM Security Bulletin for specific fix details
2. Apply the recommended fix from IBM
3. Restart affected services
4. Verify the fix by checking that API keys are no longer exposed

🔧 Temporary Workarounds

Restrict Artifactory Access

all

Limit network access to Artifactory repositories from IBM Controller systems and implement strict access controls on Artifactory.

Monitor Artifactory Activity

all

Implement enhanced logging and monitoring of Artifactory API calls from IBM Controller systems.

🧯 If You Can't Patch

  • Implement strict access controls to limit which users can access IBM Controller systems
  • Monitor and audit all Artifactory repository publishing activities for unauthorized changes

🔍 How to Verify

Check if Vulnerable:

Check if running affected versions of IBM Cognos Controller (11.0.0-11.0.1) or IBM Controller (11.1.0). Review system configuration for exposed Artifactory API keys.

Check Version:

Check IBM Controller version through administrative interface or configuration files as documented in IBM documentation.

Verify Fix Applied:

After applying IBM's fix, verify that Artifactory API keys are no longer accessible to unauthorized users and test that repository publishing functions correctly with proper authentication.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized Artifactory API calls from IBM Controller systems
  • Unexpected repository publishing events
  • Failed authentication attempts to Artifactory

Network Indicators:

  • Unusual traffic patterns to Artifactory repositories from IBM Controller systems
  • API calls to Artifactory using potentially exposed keys

SIEM Query:

Search for Artifactory API calls from IBM Controller IP addresses outside normal patterns or using unexpected authentication methods.

🔗 References

📤 Share & Export