IBM WebSphere Application Server 6.1 < 6.1.0.35 Multiple Vulnerabilities

This script is Copyright (C) 2011-2013 Tenable Network Security, Inc.


Synopsis :

The remote application server is affected by multiple vulnerabilities.

Description :

IBM WebSphere Application Server 6.1 before Fix Pack 35 appears to be
running on the remote host. As such, it is reportedly affected by
multiple vulnerabilities :

- An unspecified cross-site scripting vulnerability
exists in the Administration Console. (PM14251)

- A double free error in BBOOORBR control block could
trigger a denial of service condition. (PM17170)

- An unspecified cross-site scripting vulnerability
exists in the web container. (PM18512)

- It is possible for authenticated users to trigger a DoS
condition by using Lightweight Third-Party
Authentication (LTPA) tokens for authentication.
(PM18644)

- Sensitive wsadmin command parameters are included in
trace files, which could result in an information
disclosure vulnerability. (PM18736)

- An unspecified cross-site request forgery vulnerability
exists in the Administration Console. (PM18909)

- User credentials are not cleared from the cache, even
after a user has logged out. (PM21536)

- An unspecified vulnerability could allow improper
access to console servlets. (PM24372)

See also :

http://www-01.ibm.com/support/docview.wss?uid=swg21404665
http://www-01.ibm.com/support/docview.wss?uid=swg27009778
http://www-01.ibm.com/support/docview.wss?uid=swg27007951#61035

Solution :

If using WebSphere Application Server, apply Fix Pack 35 (6.1.0.35) or
later.

Otherwise, if using embedded WebSphere Application Server packaged with
Tivoli Directory Server, apply the latest recommended eWAS fix pack.

Risk factor :

Medium / CVSS Base Score : 4.3
(CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N)
CVSS Temporal Score : 3.6
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true