{"vuid":"VU#722868","idnumber":"722868","name":"IBM QRadar SIEM command injection vulnerability","keywords":["ibm","qradar","siem","command injection"],"overview":"IBM QRadar SIEM software contains a command injection vulnerability that allows an authenticated user to execute operating system commands on the QRadar device.","clean_desc":"The IBM security bulletin for CVE-2013-2970 states: A command injection vulnerability has been discovered within the IBM QRadar SIEM software that allows an authenticated user to execute operating system commands as a limited access user on the QRadar device. This access could be used to gain remote shell access as that webservices user. Even though authenticated users of the QRadar SIEM do not necessarily have shell access, action should be taken to ensure this issue is patched as soon as possible. The attack can be conducted over the internet. Some degree of specialized knowledge and techniques are required to conduct this attack. Multiple authentication attempts are required for this attack. An exploit may have a limited impact on the confidentiality of information and the integrity of data and could reduce performance / cause interruptions to availability. Additional details may be found in the full IBM security bulletin.","impact":"A remote authenticated attacker may be able to run operating system commands on the QRadar device.","resolution":"Apply an Update The vulnerability is fixed in the following version of QRadar SIEM: For QRadar SIEM 7.1 - install QRadar SIEM 7.1 MR2 Patch 1 \nFor QRadar SIEM 7.0 - Install Interim Fix 7.0.0-QRadar-QRSCRIPT-CVE-2013-2970.sh","workarounds":"","sysaffected":"","thanks":"Thanks to Stephen Hosom for reporting this vulnerability.","author":"This document was written by Jared Allar.","public":["h","t","t","p",":","/","/","w","w","w","-","0","1",".","i","b","m",".","c","o","m","/","s","u","p","p","o","r","t","/","d","o","c","v","i","e","w",".","w","s","s","?","u","i","d","=","s","w","g","2","1","6","3","9","3","0","9"],"cveids":["CVE-2013-2970"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2013-04-22T18:31:04Z","publicdate":"2013-06-03T00:00:00Z","datefirstpublished":"2013-06-05T17:19:54Z","dateupdated":"2013-06-05T17:19:55Z","revision":12,"vrda_d1_directreport":"1","vrda_d1_population":"3","vrda_d1_impact":"3","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"N","cvss_accesscomplexity":"M","cvss_authentication":null,"cvss_confidentialityimpact":"P","cvss_integrityimpact":"P","cvss_availabilityimpact":"P","cvss_exploitablity":null,"cvss_remediationlevel":"OF","cvss_reportconfidence":"C","cvss_collateraldamagepotential":"ND","cvss_targetdistribution":"M","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"6","cvss_basevector":"AV:N/AC:M/Au:S/C:P/I:P/A:P","cvss_temporalscore":"5","cvss_environmentalscore":"3.8","cvss_environmentalvector":"CDP:ND/TD:M/CR:ND/IR:ND/AR:ND","metric":0.0,"vulnote":null}