CVE-2024-51466

9.0 CRITICAL

📋 TL;DR

IBM Cognos Analytics is vulnerable to Expression Language (EL) Injection, allowing remote attackers to execute malicious EL statements. This can lead to sensitive information disclosure, memory exhaustion, or server crashes. Affected versions include Cognos Analytics 11.2.0 through 11.2.4 FP4 and 12.0.0 through 12.0.4.

💻 Affected Systems

Products:
  • IBM Cognos Analytics
Versions: 11.2.0 through 11.2.4 FP4 and 12.0.0 through 12.0.4
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments of affected versions are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise leading to data exfiltration, denial of service, or remote code execution depending on server configuration.

🟠

Likely Case

Sensitive information disclosure and potential server crashes causing business disruption.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls, though vulnerability remains present.

🌐 Internet-Facing: HIGH - Remote attackers can exploit this without authentication if the application is internet-facing.
🏢 Internal Only: MEDIUM - Internal attackers or compromised accounts could exploit this, but requires network access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

EL injection vulnerabilities typically have low exploitation complexity once the attack vector is identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply IBM Cognos Analytics Interim Fixes as specified in the vendor advisory

Vendor Advisory: https://www.ibm.com/support/pages/node/7179496

Restart Required: Yes

Instructions:

1. Review IBM advisory 7179496. 2. Download appropriate interim fix for your version. 3. Apply fix following IBM documentation. 4. Restart Cognos services. 5. Verify fix application.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict access to Cognos Analytics to trusted networks only

Web Application Firewall

all

Deploy WAF with EL injection detection rules

🧯 If You Can't Patch

  • Isolate Cognos Analytics servers behind strict network segmentation
  • Implement strong authentication and limit user privileges to minimum required

🔍 How to Verify

Check if Vulnerable:

Check Cognos Analytics version against affected ranges: 11.2.0-11.2.4 FP4 or 12.0.0-12.0.4

Check Version:

Check Cognos Configuration or Administration console for version information

Verify Fix Applied:

Verify version is updated beyond affected ranges and check for applied interim fixes

📡 Detection & Monitoring

Log Indicators:

  • Unusual EL expressions in request logs
  • Multiple failed requests with EL syntax
  • Memory exhaustion errors in server logs

Network Indicators:

  • Unusual patterns of requests to Cognos endpoints
  • Requests containing EL syntax patterns

SIEM Query:

source="cognos_logs" AND (message="*${*" OR message="*#{" OR message="*memory*exhaust*")

🔗 References

📤 Share & Export