Jul 30, 2018 9:00 am EDT
Categorized: High Severity
Share this post:
IBM Cloud Functions has addressed the following vulnerabilities. Users of the IBM Cloud Functions service that are using docker actions (https://ift.tt/2xQyjnh) are affected but only if the user’s function has a general security vulnerability. In this context general vulnerability means for example parameter hijacking, remote code execution or wrong usage of “eval()” (generally addressed via secure engineering best practices). With this vulnerability being present, an attacker can exploit an Apache OpenWhisk specific vulnerability to overwrite the user functions code that is then executed in subsequent executions of the same user’s function. The CVE listed below only refer to the ability to overwrite the action code. The general vulnerability which is a pre-condition for these CVEs is out of scope of this document as it is subject to general secure engineering best practices. Exploitation of the issue is only possible if the user included function code is vulnerable. The vulnerability only affects users with action code that is vulnerable in the first place. Other users who followed general secure engineering best practices are not affected.
CVE(s): CVE-2018-11756, CVE-2018-11757
Affected product(s) and affected version(s):
IBM Cloud Functions service by using custom docker images.
Refer to the following reference URLs for remediation and additional vulnerability details:
Source Bulletin: https://www-01.ibm.com/support/docview.wss?uid=ibm10718977
X-Force Database: https://exchange.xforce.ibmcloud.com/vulnerabilities/147372
X-Force Database: https://exchange.xforce.ibmcloud.com/vulnerabilities/147371
from IBM Product Security Incident Response Team https://ift.tt/2NVtSe6
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.