How to Buy
This script is Copyright (C) 2011-2015 Tenable Network Security, Inc.
The remote application server is affected by multiple vulnerabilities.
IBM WebSphere Application Server 6.1 before Fix Pack 37 appears to be
running on the remote host. As such, it is potentially affected by
the following vulnerabilities :
- It is possible to trigger a DoS condition via SAAJ
API provided by the WebSphere Web services runtime.
- An unspecified cross-site scripting vulnerability
exists in the IVT application. (PM20393)
- The AuthCache purge implementation is not able to
purge a user in AuthCache. (PM24668)
- A remote attacker can gain unspecified application access
on z/OS, when a Local OS user registry or Federated
Repository with RACF adapter is used. (PM35478)
See also :
If using WebSphere Application Server, apply Fix Pack 37 (188.8.131.52) or
Otherwise, if using embedded WebSphere Application Server packaged with
Tivoli Directory Server, apply the latest recommended eWAS fix pack.
Risk factor :
Medium / CVSS Base Score : 6.8
CVSS Temporal Score : 5.9
Public Exploit Available : true
Family: Web Servers
Nessus Plugin ID: 53475 ()
Bugtraq ID: 4673647122
CVE ID: CVE-2011-1308CVE-2011-1321CVE-2011-1322CVE-2011-1683
Nessus Professional: Scan unlimited IPs, run compliance checks & moreNessus Cloud: The power of Nessus for teams – from the cloud
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.