CVE-2024-49785

5.4 MEDIUM

📋 TL;DR

This CVE describes a cross-site scripting (XSS) vulnerability in IBM watsonx.ai that allows authenticated users to inject malicious JavaScript into the web interface. The vulnerability could lead to credential theft or session hijacking within trusted sessions. Affected systems include IBM watsonx.ai versions 1.1 through 2.0.3 and IBM watsonx.ai on Cloud Pak for Data versions 4.8 through 5.0.3.

💻 Affected Systems

Products:
  • IBM watsonx.ai
  • IBM watsonx.ai on Cloud Pak for Data
Versions: IBM watsonx.ai 1.1 through 2.0.3; IBM watsonx.ai on Cloud Pak for Data 4.8 through 5.0.3
Operating Systems: All platforms running affected software
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user access to exploit. Cloud deployments may be automatically patched by IBM.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could steal administrator credentials, hijack user sessions, perform actions as authenticated users, and potentially pivot to other systems.

🟠

Likely Case

Authenticated attackers could steal session cookies or credentials from other users, leading to unauthorized access to sensitive data within watsonx.ai.

🟢

If Mitigated

With proper input validation and output encoding, the attack surface is limited to authenticated users only, reducing the blast radius.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

XSS vulnerabilities typically have low exploitation complexity once the injection point is identified. Requires authenticated access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: IBM watsonx.ai 2.0.4 and later; IBM watsonx.ai on Cloud Pak for Data 5.0.4 and later

Vendor Advisory: https://www.ibm.com/support/pages/node/7180723

Restart Required: Yes

Instructions:

1. Review IBM advisory. 2. Upgrade to patched versions. 3. Restart affected services. 4. Verify fix implementation.

🔧 Temporary Workarounds

Input Validation and Sanitization

all

Implement server-side input validation and output encoding for all user-controllable inputs in the web interface.

Content Security Policy (CSP)

all

Implement strict CSP headers to restrict execution of inline JavaScript and limit script sources.

🧯 If You Can't Patch

  • Restrict user permissions to minimize attack surface
  • Implement web application firewall (WAF) rules to detect and block XSS payloads

🔍 How to Verify

Check if Vulnerable:

Check current version against affected ranges. Review application logs for suspicious input patterns.

Check Version:

Consult IBM documentation for version check commands specific to your deployment.

Verify Fix Applied:

Verify installation of patched versions. Test XSS payloads in user input fields to confirm sanitization.

📡 Detection & Monitoring

Log Indicators:

  • Unusual JavaScript patterns in user input fields
  • Multiple failed authentication attempts following suspicious inputs

Network Indicators:

  • Suspicious outbound connections from watsonx.ai servers
  • Unusual traffic patterns to credential storage systems

SIEM Query:

source="watsonx.ai" AND (message="*script*" OR message="*javascript*" OR message="*alert*" OR message="*onerror*")

🔗 References

📤 Share & Export