IBM Aspera Faspex < 4.4.2 PL2 Remote Code Execution

critical Web App Scanning Plugin ID 114275

Synopsis

IBM Aspera Faspex < 4.4.2 PL2 Remote Code Execution

Description

IBM Aspera Faspex versions before 4.4.2 patch level 2 suffer from a YAML deserialization issue. By crafting a specific payload on a specific API path, a remote and unauthenticated attacker can achieve remote code execution on the target instance.

Solution

Update IBM Aspera Faspex to version 4.4.2 patch level 2 or later.

See Also

https://blog.assetnote.io/2023/02/02/pre-auth-rce-aspera-faspex/

https://www.ibm.com/docs/en/aspera-faspex/4.4?topic=notes-release-aspera-faspex-442

Plugin Details

Severity: Critical

ID: 114275

Type: remote

Published: 5/6/2024

Updated: 5/6/2024

Scan Template: basic, full, pci, scan

Risk Information

VPR

Risk Factor: Critical

Score: 9.0

CVSS v2

Risk Factor: Critical

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2022-47986

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS Score Source: CVE-2022-47986

Vulnerability Information

CPE: cpe:2.3:a:ibm:aspera_faspex:*:*:*:*:*:*:*:*

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 1/18/2023

Vulnerability Publication Date: 1/18/2023

CISA Known Exploited Vulnerability Due Dates: 3/14/2023

Reference Information

CVE: CVE-2022-47986