How to Buy
This script is Copyright (C) 2011-2013 Tenable Network Security, Inc.
The remote application server is affected by multiple vulnerabilities.
IBM WebSphere Application Server 6.1 before Fix Pack 39 appears to be
running on the remote host. As such, it is potentially affected by
the following vulnerabilities :
- Use of an insecure XML encryption algorithm could allow
for decryption of JAX-RPC or JAX-WS Web Services
- An error exists in the validation of the
'logoutExitPage' parameter that can allow a remote
attacker to bypass security restrictions and redirect
users in support of a phishing attack. (PM35701)
- An error exists in the handling of administration
console requests. This error can allow a local attacker
to use a specially crafted request to view sensitive
stack-trace information. (PM36620)
See also :
If using WebSphere Application Server, apply Fix Pack 39 (126.96.36.199) or
Otherwise, if using embedded WebSphere Application Server packaged with
Tivoli Directory Server, apply the latest recommended eWAS fix pack.
Risk factor :
Medium / CVSS Base Score : 5.8
CVSS Temporal Score : 4.3
Public Exploit Available : false
Family: Web Servers
Nessus Plugin ID: 55649 ()
Bugtraq ID: 478314870948710
CVE ID: CVE-2011-1209CVE-2011-1355CVE-2011-1356
Upgrade to Nessus Professional today!
Start your free Nessus Cloud trial now!
Begin Free Trial
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.