IBM WebSphere Application Server < 6.1.0.23 Multiple Flaws

This script is Copyright (C) 2009-2013 Tenable Network Security, Inc.


Synopsis :

The remote application server is affected by multiple vulnerabilities.

Description :

IBM WebSphere Application Server 6.1 before Fix Pack 23 appears to
be installed on the remote host. Such versions are reportedly affected
by multiple vulnerabilities :

- Provided an attacker has valid credentials, it may be
possible to hijack an authenticated session. (PK66676)

- It may be possible for a remote attacker to redirect
users to arbitrary sites using ibm_security_logout
servlet. (PK71126)

- Under certain conditions it may be possible to access
administrative console user sessions. (PK74966)

- If APAR PK41002 has been applied, a vulnerability in
the JAX-RPC WS-Security component could incorrectly
validate 'UsernameToken'. (PK75992)

- Sample applications shipped with IBM WebSphere
Application Server are affected by cross-site scripting
vulnerabilities. (PK76720)

- The administrative console is affected by a cross-site
scripting vulnerability. (PK77505)

- It may be possible for an attacker to read arbitrary
application-specific war files. (PK81387)

See also :

http://www-01.ibm.com/support/docview.wss?uid=swg21404665
http://www-01.ibm.com/support/docview.wss?uid=swg27009778
http://www-01.ibm.com/support/docview.wss?uid=swg21367223
http://www-01.ibm.com/support/docview.wss?rs=180&uid=swg27007951#61023

Solution :

If using WebSphere Application Server, apply Fix Pack 23 (6.1.0.23) or
later.

Otherwise, if using embedded WebSphere Application Server packaged with
Tivoli Directory Server, apply the latest recommended eWAS fix pack.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 6.2
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true