CVE-2024-35144

5.3 MEDIUM

📋 TL;DR

IBM Maximo Application Suite's Monitor Component stores source code files on the web server that could be accessed by attackers. This information disclosure vulnerability could help attackers understand the application's structure and potentially find additional weaknesses. Affects IBM Maximo Application Suite versions 8.10, 8.11, and 9.0 with the Monitor Component enabled.

💻 Affected Systems

Products:
  • IBM Maximo Application Suite
Versions: 8.10, 8.11, 9.0
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with the Monitor Component installed and enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers obtain source code, analyze it for additional vulnerabilities, chain with other weaknesses to achieve remote code execution or data exfiltration.

🟠

Likely Case

Attackers access source code to understand application architecture, identify hardcoded credentials, API keys, or business logic flaws for further exploitation.

🟢

If Mitigated

Limited information disclosure with no direct path to system compromise if proper network segmentation and access controls are in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Information disclosure vulnerabilities typically require minimal technical skill to exploit once the vulnerable endpoint is identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply interim fix or upgrade to latest version

Vendor Advisory: https://www.ibm.com/support/pages/node/7174953

Restart Required: Yes

Instructions:

1. Review IBM advisory 7174953. 2. Apply the recommended interim fix for your version. 3. Restart the Maximo Application Suite services. 4. Verify source code files are no longer accessible.

🔧 Temporary Workarounds

Remove or restrict access to Monitor Component

all

Disable the Monitor Component if not required for operations

Web server access controls

linux

Configure web server to block access to source code directories

# Apache example: <Location "/monitor/source/"> Require all denied </Location>
# Nginx example: location ~ ^/monitor/source/ { deny all; }

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can reach the Monitor Component endpoints
  • Deploy a web application firewall with rules to block access to source code file patterns

🔍 How to Verify

Check if Vulnerable:

Attempt to access Monitor Component source code URLs (e.g., /monitor/source/*.java, /monitor/source/*.js) from an unauthenticated perspective

Check Version:

Check Maximo version via administrative console or review installation documentation

Verify Fix Applied:

Verify source code files are no longer accessible via web requests after applying patch or workarounds

📡 Detection & Monitoring

Log Indicators:

  • HTTP 200 responses for source code file requests
  • Unusual access patterns to /monitor/source/ paths
  • Multiple failed attempts followed by successful source code access

Network Indicators:

  • Unusual GET requests for .java, .js, .xml files in monitor paths
  • Traffic to Monitor Component from unexpected sources

SIEM Query:

web_access_logs status=200 AND uri_path="/monitor/source/" AND (uri_extension="java" OR uri_extension="js" OR uri_extension="xml")

🔗 References

📤 Share & Export