CVE-2024-54176

4.3 MEDIUM

📋 TL;DR

This vulnerability in IBM DevOps Deploy and UrbanCode Deploy allows authenticated users to access sensitive information about other users due to missing authorization checks. It affects multiple versions of both products. The risk is limited to authenticated users but could lead to information disclosure.

💻 Affected Systems

Products:
  • IBM DevOps Deploy
  • IBM UrbanCode Deploy
Versions: DevOps Deploy 8.0-8.0.1.4, 8.1-8.1.0.0; UrbanCode Deploy 7.0-7.0.5.25, 7.1-7.1.2.21, 7.2-7.2.3.14, 7.3-7.3.2
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the affected IBM products.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker could enumerate all user accounts, potentially obtaining usernames, roles, permissions, or other sensitive metadata that could facilitate further attacks.

🟠

Likely Case

An authenticated user with legitimate access could accidentally or intentionally view information about other users they shouldn't have access to, violating privacy and potentially revealing organizational structure.

🟢

If Mitigated

With proper access controls and monitoring, the impact is limited to information disclosure that doesn't include passwords or highly sensitive data.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access to the vulnerable systems. The vulnerability is in authorization logic, not authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: DevOps Deploy 8.0.1.5, 8.1.0.1; UrbanCode Deploy 7.0.5.26, 7.1.2.22, 7.2.3.15, 7.3.2.1

Vendor Advisory: https://www.ibm.com/support/pages/node/7182840

Restart Required: Yes

Instructions:

1. Download the appropriate fix pack from IBM Fix Central. 2. Backup your current installation. 3. Apply the fix pack following IBM's installation instructions. 4. Restart the application server.

🔧 Temporary Workarounds

Restrict User Access

all

Limit which users have access to the affected IBM products to reduce the attack surface.

Implement Network Segmentation

all

Place the IBM products in restricted network segments accessible only to authorized users.

🧯 If You Can't Patch

  • Implement strict access controls and monitor user activity for unusual information access patterns.
  • Consider temporarily disabling non-essential user accounts until patching can be completed.

🔍 How to Verify

Check if Vulnerable:

Check your IBM product version against the affected versions listed above. The vulnerability exists if you're running any of the affected versions.

Check Version:

Check the product version in the IBM product's administration console or configuration files.

Verify Fix Applied:

After applying patches, verify the version number matches or exceeds the fixed versions listed in the fix_official section.

📡 Detection & Monitoring

Log Indicators:

  • Unusual user information access patterns
  • Multiple user enumeration attempts from single accounts
  • Access to user management functions by non-admin users

Network Indicators:

  • HTTP requests to user information endpoints from unauthorized accounts

SIEM Query:

source="ibm_ucd.log" AND (event="user_query" OR event="user_list") AND user_role!="admin"

🔗 References

📤 Share & Export