IBM has addressed two critical vulnerabilities in IBM WebSphere Application Server that could allow a remote attacker to execute arbitrary code.
In April, a security researcher who goes online with the moniker ‘tint0’ discovered three serious deserialization issues affecting the IBM WebSphere Application Server.
The expert reported the issues to IBM through Trend Micro’s Zero Day Initiative (ZDI) in mid-April, the IT giant publicly disclosed them last week.
“This vulnerability allows remote attackers to execute arbitrary code on affected installations of IBM WebSphere. Authentication is not required to exploit this vulnerability.” reads the advisory for the CVE-2020-4448 published by IBM.
“The specific flaw exists within the BroadcastMessageManager class. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data.”
The CVE-2020-4448 issue resides in the BroadcastMessageManager class and it could be exploited to execute arbitrary code execution with SYSTEM privileges.
The CVE-2020-4450 flaw exists within the handling of the IIOP protocol and it can be exploited by attackers to allow code execution with root privileges.
The vulnerability could be exploited by sending a specially crafted sequence of serialized objects.
The third vulnerability, tracked as CVE-2020-4449, affects the IIOP deserialization and it can lead to information disclosure, it could be exploited by a remote, unauthenticated attacker by sending a specially crafted sequence of serialized objects.
IBM has already addressed all the vulnerabilities, it confirmed that there is no evidence of attacks exploiting the flaws in the wild.
(SecurityAffairs – IBM WebSphere, hacking)