CVE-2025-36364

6.2 MEDIUM

📋 TL;DR

IBM DevOps Plan versions 3.0.0 through 3.0.5 store web page cache locally without proper isolation, allowing other users on the same system to read cached data. This affects organizations using these versions of IBM DevOps Plan on multi-user systems where local file access is shared.

💻 Affected Systems

Products:
  • IBM DevOps Plan
Versions: 3.0.0 through 3.0.5
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects multi-user systems where multiple users have access to the same local file system. Single-user systems are not vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Sensitive DevOps data (credentials, configuration details, proprietary code) cached in web pages could be extracted by other local users, leading to data breach, privilege escalation, or lateral movement.

🟠

Likely Case

Other users on the same system can access cached web content containing potentially sensitive DevOps information, though the exact data exposed depends on what was cached.

🟢

If Mitigated

With proper user isolation and access controls, risk is limited as only authorized users can access the local cache directories.

🌐 Internet-Facing: LOW - This is a local file access vulnerability requiring local system access, not directly exploitable over the network.
🏢 Internal Only: MEDIUM - On multi-user systems without proper user isolation, other local users can access cached data, potentially exposing sensitive DevOps information.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local system access and ability to read files from other users' cache directories. No authentication bypass needed beyond local file system access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.0.6 or later

Vendor Advisory: https://www.ibm.com/support/pages/node/7261930

Restart Required: Yes

Instructions:

1. Download IBM DevOps Plan version 3.0.6 or later from IBM support. 2. Stop the IBM DevOps Plan service. 3. Install the updated version. 4. Restart the service. 5. Verify the cache isolation is properly implemented.

🔧 Temporary Workarounds

Implement strict file permissions

linux

Set restrictive permissions on IBM DevOps Plan cache directories to prevent other users from reading them

chmod 700 /path/to/devops/cache
chown devopsuser:devopsgroup /path/to/devops/cache

Use separate user accounts

all

Ensure IBM DevOps Plan runs under a dedicated user account with no other users sharing that account

🧯 If You Can't Patch

  • Implement strict user isolation policies to prevent multiple users from accessing the same system
  • Regularly clear the web cache and monitor cache directories for unauthorized access attempts

🔍 How to Verify

Check if Vulnerable:

Check IBM DevOps Plan version via web interface or configuration files. If version is between 3.0.0 and 3.0.5 inclusive, the system is vulnerable.

Check Version:

Check the version in the web interface or examine the installation directory for version files

Verify Fix Applied:

After patching to 3.0.6+, verify that cache directories have proper permissions (700 on Linux) and are only accessible by the service account.

📡 Detection & Monitoring

Log Indicators:

  • Failed access attempts to cache directories from unauthorized users
  • Unusual file read patterns in cache directories

Network Indicators:

  • No network-based indicators as this is a local vulnerability

SIEM Query:

source="file_access_logs" AND target_path="*devops*cache*" AND user!="devops_service_account"

🔗 References

📤 Share & Export