CVE-2025-33096

6.5 MEDIUM

📋 TL;DR

This vulnerability in IBM Engineering Requirements Management Doors Next allows authenticated users to cause denial of service by uploading specially crafted files that trigger uncontrolled recursion. It affects versions 7.0.2, 7.0.3, and 7.1 of the software. Attackers with valid credentials can disrupt service availability.

💻 Affected Systems

Products:
  • IBM Engineering Requirements Management Doors Next
Versions: 7.0.2, 7.0.3, 7.1
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user access to the file upload functionality. All default configurations with affected versions are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service unavailability requiring system restart or recovery procedures, potentially disrupting engineering workflows and project timelines.

🟠

Likely Case

Temporary service degradation or crashes affecting specific components, requiring administrator intervention to restore normal operations.

🟢

If Mitigated

Minimal impact with proper access controls and monitoring in place, allowing quick detection and response to suspicious upload attempts.

🌐 Internet-Facing: MEDIUM - If the application is exposed to the internet, authenticated attackers could exploit it, but authentication requirement reduces risk compared to unauthenticated vulnerabilities.
🏢 Internal Only: MEDIUM - Internal users with valid credentials could intentionally or accidentally trigger the DoS condition, affecting business operations.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authenticated access and knowledge of how to craft files that trigger uncontrolled recursion. No public exploit code is currently available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply the fix as specified in IBM Security Bulletin

Vendor Advisory: https://www.ibm.com/support/pages/node/7247716

Restart Required: No

Instructions:

1. Review IBM Security Bulletin for specific patch details. 2. Apply the recommended fix from IBM. 3. Verify the fix by testing file upload functionality. 4. No restart required according to IBM documentation.

🔧 Temporary Workarounds

Restrict File Upload Access

all

Limit file upload permissions to only trusted, necessary users through role-based access controls.

Implement File Upload Monitoring

all

Monitor file upload activities and set alerts for unusual upload patterns or repeated upload attempts.

🧯 If You Can't Patch

  • Implement strict access controls to limit file upload functionality to essential personnel only
  • Deploy web application firewall rules to detect and block suspicious file upload patterns

🔍 How to Verify

Check if Vulnerable:

Check your IBM Engineering Requirements Management Doors Next version against affected versions: 7.0.2, 7.0.3, or 7.1.

Check Version:

Check the application's About or Version information within the IBM Engineering Requirements Management Doors Next interface or consult system documentation.

Verify Fix Applied:

After applying IBM's fix, verify by checking that the software version is no longer listed as vulnerable and test file upload functionality.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed file upload attempts
  • Unusually large or recursive file processing logs
  • Application crash or restart logs following file uploads

Network Indicators:

  • Unusual spikes in file upload traffic
  • Repeated upload attempts from single authenticated users

SIEM Query:

source="ibm-doors" AND (event="file_upload" AND size>threshold) OR (event="application_error" AND message CONTAINS "recursion")

🔗 References

📤 Share & Export