CVE-2024-49781

7.1 HIGH

📋 TL;DR

IBM OpenPages with Watson versions 8.3 and 9.0 contain an XML external entity injection (XXE) vulnerability that allows attackers to read sensitive files from the server or cause denial of service through resource consumption. This affects organizations using these specific versions of IBM's governance, risk, and compliance platform.

💻 Affected Systems

Products:
  • IBM OpenPages with Watson
Versions: 8.3 and 9.0
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments of affected versions are vulnerable unless specifically configured to disable XXE processing.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server file system disclosure including configuration files, credentials, and sensitive data, potentially leading to full system compromise.

🟠

Likely Case

Partial file system access allowing attackers to read configuration files and sensitive data stored on the server.

🟢

If Mitigated

Limited impact with proper input validation and XML parser configuration preventing external entity resolution.

🌐 Internet-Facing: HIGH - Remote attackers can exploit this vulnerability without authentication if the application is exposed to the internet.
🏢 Internal Only: MEDIUM - Internal attackers or compromised accounts could exploit this to escalate privileges or access sensitive data.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires ability to submit XML data to vulnerable endpoints. No public exploit code available at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply fixes as specified in IBM advisory

Vendor Advisory: https://www.ibm.com/support/pages/node/7183541

Restart Required: No

Instructions:

1. Review IBM advisory at provided URL
2. Apply the recommended fix or upgrade to a patched version
3. Verify XML parser configuration disables external entity processing

🔧 Temporary Workarounds

Disable XXE Processing

all

Configure XML parsers to disable external entity resolution and DTD processing

Configure XML parser properties: set FEATURE_SECURE_PROCESSING=true, disable external-general-entities, disable external-parameter-entities

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block XML payloads containing external entity declarations
  • Restrict network access to OpenPages application to trusted sources only

🔍 How to Verify

Check if Vulnerable:

Check if running IBM OpenPages with Watson version 8.3 or 9.0. Test XML endpoints with XXE payloads in controlled environment.

Check Version:

Check OpenPages administration console or application logs for version information

Verify Fix Applied:

Verify XML parser configuration disables external entity processing. Test with XXE payloads that should be rejected.

📡 Detection & Monitoring

Log Indicators:

  • Unusual XML parsing errors
  • File system access attempts via XML parsing
  • Large XML payloads with external entity references

Network Indicators:

  • XML requests containing SYSTEM or PUBLIC declarations
  • Outbound requests to external URLs from XML parser

SIEM Query:

source="openpages" AND (message="*XXE*" OR message="*external entity*" OR message="*DOCTYPE*")

🔗 References

📤 Share & Export