IBM WebSphere Application Server 6.1 < 6.1.0.39 Multiple Vulnerabilities

This script is Copyright (C) 2011-2013 Tenable Network Security, Inc.


Synopsis :

The remote application server is affected by multiple vulnerabilities.

Description :

IBM WebSphere Application Server 6.1 before Fix Pack 39 appears to be
running on the remote host. As such, it is potentially affected by
the following vulnerabilities :

- Use of an insecure XML encryption algorithm could allow
for decryption of JAX-RPC or JAX-WS Web Services
requests. (PM34841)

- An error exists in the validation of the
'logoutExitPage' parameter that can allow a remote
attacker to bypass security restrictions and redirect
users in support of a phishing attack. (PM35701)

- An error exists in the handling of administration
console requests. This error can allow a local attacker
to use a specially crafted request to view sensitive
stack-trace information. (PM36620)

See also :

http://www-01.ibm.com/support/docview.wss?uid=swg21404665
http://www-01.ibm.com/support/docview.wss?uid=swg27009778
http://www-01.ibm.com/support/docview.wss?uid=swg27007951#61039

Solution :

If using WebSphere Application Server, apply Fix Pack 39 (6.1.0.39) or
later.

Otherwise, if using embedded WebSphere Application Server packaged with
Tivoli Directory Server, apply the latest recommended eWAS fix pack.

Risk factor :

Medium / CVSS Base Score : 5.8
(CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:P)
CVSS Temporal Score : 4.3
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: Web Servers

Nessus Plugin ID: 55649 ()

Bugtraq ID: 47831
48709
48710

CVE ID: CVE-2011-1209
CVE-2011-1355
CVE-2011-1356