CVE-2025-36357

8.0 HIGH

📋 TL;DR

CVE-2025-36357 is a directory traversal vulnerability in IBM Planning Analytics Local that allows authenticated remote attackers to access arbitrary files on the system. Attackers can exploit this by sending specially crafted URL requests containing absolute path sequences to read, write, or view sensitive files. This affects IBM Planning Analytics Local versions 2.1.0 through 2.1.14.

💻 Affected Systems

Products:
  • IBM Planning Analytics Local
Versions: 2.1.0 through 2.1.14
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the Planning Analytics Local interface. All deployments within the affected version range are vulnerable by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise through reading sensitive configuration files, writing malicious files, or accessing credentials leading to complete data breach and system takeover.

🟠

Likely Case

Unauthorized access to sensitive business data, configuration files, or user information stored on the server, potentially leading to data theft or further privilege escalation.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent authenticated attackers from reaching vulnerable systems.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is technically simple once credentials are obtained. The vulnerability is in URL path handling.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.1.15 or later

Vendor Advisory: https://www.ibm.com/support/pages/node/7251265

Restart Required: Yes

Instructions:

1. Download IBM Planning Analytics Local version 2.1.15 or later from IBM Fix Central. 2. Backup current configuration and data. 3. Stop the Planning Analytics Local service. 4. Install the updated version. 5. Restart the service. 6. Verify functionality.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict network access to Planning Analytics Local to only trusted IP addresses and users who require access.

Enhanced Authentication Controls

all

Implement multi-factor authentication and strong password policies to reduce risk of credential compromise.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Planning Analytics Local from sensitive systems and data
  • Deploy web application firewall (WAF) rules to block directory traversal patterns in URL requests

🔍 How to Verify

Check if Vulnerable:

Check the installed version of IBM Planning Analytics Local via the administration console or by examining installation directories for version files.

Check Version:

Check the version in the Planning Analytics Local administration interface or review the product documentation for version identification methods.

Verify Fix Applied:

Verify the version is 2.1.15 or later and test that directory traversal attempts via crafted URLs are properly rejected.

📡 Detection & Monitoring

Log Indicators:

  • Unusual URL patterns with absolute paths or directory traversal sequences (../, ..\) in web server logs
  • Multiple failed authentication attempts followed by successful login and unusual file access patterns

Network Indicators:

  • HTTP requests containing path traversal sequences to Planning Analytics Local endpoints
  • Unusual outbound data transfers from the Planning Analytics server

SIEM Query:

source="web_server_logs" AND (url="*../*" OR url="*..\\*") AND dest_ip="[Planning_Analytics_IP]"

🔗 References

📤 Share & Export