CVE-2022-35282
IBM WebSphere App Server vulnerability analysis and mitigation

Overview

IBM WebSphere Application Server versions 7.0, 8.0, 8.5, and 9.0 were identified with a server-side request forgery (SSRF) vulnerability, tracked as CVE-2022-35282. The vulnerability was discovered and initially recorded on July 6, 2022, with public disclosure occurring on September 28, 2022. This security flaw affects multiple editions of WebSphere Application Server including Advanced, Base, Developer, Enterprise, Express, Network Deployment, and Single Server across various platforms such as AIX, HP-UX, IBM i, Linux, Solaris, Windows, and z/OS (IBM Support).

Technical details

The vulnerability has been assigned a CVSS Base score of 4.3 with a vector of CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N. This scoring indicates that the vulnerability requires local network access to exploit, has low attack complexity, requires no privileges, and can result in low confidentiality impact without affecting integrity or availability (IBM Support, Rapid7).

Impact

When successfully exploited, this vulnerability allows an attacker with local network access to obtain sensitive data through specially crafted requests. The impact is primarily focused on data confidentiality, with no direct effect on system integrity or availability (IBM Support).

Mitigation and workarounds

IBM has released fixes for all affected versions through APAR PH47385. For version 9.0.0.0 through 9.0.5.13, users can either upgrade to Fix Pack 9.0.5.14 or later, or apply Interim Fix PH47385. Version 8.5.0.0 through 8.5.5.22 users should upgrade to Fix Pack 8.5.5.23 or later, or apply Interim Fix PH47385. Version 8.0.0.0 through 8.0.0.15 users must upgrade to 8.0.0.15 and apply Interim Fix PH47385. Version 7.0.0.0 through 7.0.0.45 users need to upgrade to 7.0.0.45 and apply Interim Fix PH47385. IBM strongly recommends users of versions 7.0 and 8.0, which are no longer in full support, to upgrade to a supported version (IBM Support).

Community reactions

The vulnerability was initially discovered and reported by thiscodecc of MoyunSec V-Lab, demonstrating ongoing security research efforts in identifying potential threats to enterprise applications (IBM Support).

Additional resources


SourceThis report was generated using AI

Related IBM WebSphere App Server vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2023-27554CRITICAL9.1
  • IBM WebSphere App ServerIBM WebSphere App Server
  • cpe:2.3:a:ibm:websphere_application_server
NoYesMay 11, 2023
CVE-2024-22353HIGH7.5
  • IBM WebSphere App ServerIBM WebSphere App Server
  • cpe:2.3:a:ibm:websphere_application_server
NoNoMar 31, 2024
CVE-2023-38737HIGH7.5
  • IBM WebSphere App ServerIBM WebSphere App Server
  • cpe:2.3:a:ibm:websphere_application_server
NoNoAug 16, 2023
CVE-2023-50313MEDIUM6.5
  • IBM WebSphere App ServerIBM WebSphere App Server
  • cpe:2.3:a:ibm:websphere_application_server
NoYesApr 02, 2024
CVE-2023-35890MEDIUM5.5
  • IBM WebSphere App ServerIBM WebSphere App Server
  • cpe:2.3:a:ibm:websphere_application_server
NoYesJul 07, 2023

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management