How to Buy
This script is Copyright (C) 2009-2016 Tenable Network Security, Inc.
The remote application server is affected by multiple vulnerabilities.
IBM WebSphere Application Server 6.1 before Fix Pack 27 appears to be
running on the remote host. As such, it is reportedly affected by
multiple vulnerabilities :
- The Eclipse help system included with WebSphere
Application Server is affected by a cross-site
scripting vulnerability. (PK78917)
- It may be possible to bypass security restrictions
using a specially crafted HTTP HEAD method. (PK83258)
- New applications deployed in WebSphere Application
Server for z/OS prior to 1.8 are saved on the file
system with insecure privileges resulting in
disclosure of sensitive information. (PK83308)
- If JAAS-J2C Authentication Data is configured using
wsadmin scripts, the password value may appear in
FFDC logs. (PK86137)
- Apache APR-util is affected by a denial of service
- Due to an error in expat XML parser, APR-util is
affected by a denial of service issue. (PK88342)
- It may be possible to trigger a denial of service
attack due to errors in Fix Packs 220.127.116.11 and
See also :
If using WebSphere Application Server, apply Fix Pack 27 (18.104.22.168) or
Otherwise, if using embedded WebSphere Application Server packaged with
Tivoli Directory Server, apply the latest recommended eWAS fix pack.
Risk factor :
Medium / CVSS Base Score : 5.0
CVSS Temporal Score : 4.1
Public Exploit Available : true
Family: Web Servers
Nessus Plugin ID: 41057 ()
Bugtraq ID: 35221352513525336157364553645636458
CVE ID: CVE-2009-0023CVE-2009-1955CVE-2009-1956CVE-2009-2091CVE-2009-2742CVE-2009-2743CVE-2009-2744CVE-2009-3106
Upgrade to Nessus Professional today!
Start your free Nessus Cloud trial now!
Begin Free Trial
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.