CVE-2025-1348

4.0 MEDIUM

📋 TL;DR

This vulnerability allows a local user to access sensitive information from another user's web browser cache due to improper caching policies in IBM Sterling products. It affects IBM Sterling B2B Integrator and IBM Sterling File Gateway installations. Attackers must have local access to the system to exploit this information disclosure issue.

💻 Affected Systems

Products:
  • IBM Sterling B2B Integrator
  • IBM Sterling File Gateway
Versions: 6.0.0.0 through 6.1.2.6 and 6.2.0.0 through 6.2.0.4
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: All installations within affected version ranges are vulnerable by default. Requires local user access to exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local attacker gains access to sensitive business data, credentials, or session information cached in another user's browser, potentially leading to data theft or privilege escalation.

🟠

Likely Case

Local user accesses cached administrative interface data or business transaction information, compromising data confidentiality.

🟢

If Mitigated

With proper access controls and browser security settings, impact is limited to low-privilege cached data.

🌐 Internet-Facing: LOW - This requires local access to the system, not remote exploitation.
🏢 Internal Only: MEDIUM - Local users with access to shared workstations or kiosk systems could exploit this to access other users' cached data.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: NO
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access to the system and knowledge of browser cache locations. No authentication bypass needed as it targets cached data.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply IBM Sterling B2B Integrator and IBM Sterling File Gateway 6.1.2.7 or 6.2.0.5

Vendor Advisory: https://www.ibm.com/support/pages/node/7237068

Restart Required: Yes

Instructions:

1. Download the appropriate fix pack from IBM Fix Central. 2. Stop all Sterling services. 3. Apply the fix pack following IBM installation instructions. 4. Restart all services. 5. Verify the update was successful.

🔧 Temporary Workarounds

Configure Browser Cache Controls

all

Implement HTTP headers to prevent browser caching of sensitive pages

Configure web server to add: Cache-Control: no-store, no-cache, must-revalidate
Add: Pragma: no-cache
Add: Expires: 0

Implement Session Timeout Policies

all

Reduce session duration and implement automatic logout to limit cached data exposure

Configure session timeout in web.xml or application settings

🧯 If You Can't Patch

  • Implement strict access controls to limit local user access to Sterling systems
  • Configure all user browsers to clear cache on exit and disable persistent caching for Sterling URLs

🔍 How to Verify

Check if Vulnerable:

Check current version against affected ranges: 6.0.0.0-6.1.2.6 or 6.2.0.0-6.2.0.4

Check Version:

Check version in Sterling administration console or review installation logs

Verify Fix Applied:

Verify version is 6.1.2.7 or higher, or 6.2.0.5 or higher. Test that sensitive pages include Cache-Control: no-store headers.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed cache access attempts from same local user
  • Unusual browser cache access patterns

Network Indicators:

  • None - this is a local information disclosure vulnerability

SIEM Query:

Search for local user accessing browser cache directories on Sterling servers

🔗 References

📤 Share & Export