CVE-2024-49781
📋 TL;DR
IBM OpenPages with Watson versions 8.3 and 9.0 contain an XML external entity injection (XXE) vulnerability that allows attackers to read sensitive files from the server or cause denial of service through resource consumption. This affects organizations using these specific versions of IBM's governance, risk, and compliance platform.
💻 Affected Systems
- IBM OpenPages with Watson
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete server file system disclosure including configuration files, credentials, and sensitive data, potentially leading to full system compromise.
Likely Case
Partial file system access allowing attackers to read configuration files and sensitive data stored on the server.
If Mitigated
Limited impact with proper input validation and XML parser configuration preventing external entity resolution.
🎯 Exploit Status
Requires ability to submit XML data to vulnerable endpoints. No public exploit code available at this time.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Apply fixes as specified in IBM advisory
Vendor Advisory: https://www.ibm.com/support/pages/node/7183541
Restart Required: No
Instructions:
1. Review IBM advisory at provided URL
2. Apply the recommended fix or upgrade to a patched version
3. Verify XML parser configuration disables external entity processing
🔧 Temporary Workarounds
Disable XXE Processing
allConfigure XML parsers to disable external entity resolution and DTD processing
Configure XML parser properties: set FEATURE_SECURE_PROCESSING=true, disable external-general-entities, disable external-parameter-entities
🧯 If You Can't Patch
- Implement web application firewall (WAF) rules to block XML payloads containing external entity declarations
- Restrict network access to OpenPages application to trusted sources only
🔍 How to Verify
Check if Vulnerable:
Check if running IBM OpenPages with Watson version 8.3 or 9.0. Test XML endpoints with XXE payloads in controlled environment.
Check Version:
Check OpenPages administration console or application logs for version information
Verify Fix Applied:
Verify XML parser configuration disables external entity processing. Test with XXE payloads that should be rejected.
📡 Detection & Monitoring
Log Indicators:
- Unusual XML parsing errors
- File system access attempts via XML parsing
- Large XML payloads with external entity references
Network Indicators:
- XML requests containing SYSTEM or PUBLIC declarations
- Outbound requests to external URLs from XML parser
SIEM Query:
source="openpages" AND (message="*XXE*" OR message="*external entity*" OR message="*DOCTYPE*")