IBM WebSphere Application Server 6.1 < 6.1.0.39 Multiple Vulnerabilities

This script is Copyright (C) 2011-2013 Tenable Network Security, Inc.


Synopsis :

The remote application server is affected by multiple vulnerabilities.

Description :

IBM WebSphere Application Server 6.1 before Fix Pack 39 appears to be
running on the remote host. As such, it is potentially affected by
the following vulnerabilities :

- Use of an insecure XML encryption algorithm could allow
for decryption of JAX-RPC or JAX-WS Web Services
requests. (PM34841)

- An error exists in the validation of the
'logoutExitPage' parameter that can allow a remote
attacker to bypass security restrictions and redirect
users in support of a phishing attack. (PM35701)

- An error exists in the handling of administration
console requests. This error can allow a local attacker
to use a specially crafted request to view sensitive
stack-trace information. (PM36620)

See also :

http://www-01.ibm.com/support/docview.wss?uid=swg21404665
http://www-01.ibm.com/support/docview.wss?uid=swg27009778
http://www-01.ibm.com/support/docview.wss?uid=swg27007951#61039

Solution :

If using WebSphere Application Server, apply Fix Pack 39 (6.1.0.39) or
later.

Otherwise, if using embedded WebSphere Application Server packaged with
Tivoli Directory Server, apply the latest recommended eWAS fix pack.

Risk factor :

Medium / CVSS Base Score : 5.8
(CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:P)
CVSS Temporal Score : 4.3
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: Web Servers

Nessus Plugin ID: 55649 ()

Bugtraq ID: 47831
48709
48710

CVE ID: CVE-2011-1209
CVE-2011-1355
CVE-2011-1356

Ready to Scan Unlimited IPs & Run Compliance Checks?

Upgrade to Nessus Professional today!

Buy Now

Combine the Power of Nessus with the Ease of Cloud

Start your free Nessus Cloud trial now!

Begin Free Trial