How to Buy
This script is Copyright (C) 2011-2013 Tenable Network Security, Inc.
The remote application server is affected by multiple vulnerabilities.
IBM WebSphere Application Server 6.1 before Fix Pack 29 appears to be
running on the remote host. As such, it is reportedly affected by
multiple vulnerabilities :
- A cross-site request forgery vulnerability exists due
to insufficient validation of user-supplied input by
the administrative console. (PK87176)
- Due to an error in Java Naming and Directory Interface,
it may be possible to obtain sensitive information.
- The administrative console is affected by a
cross-site scripting vulnerability. (PK92057)
See also :
If using WebSphere Application Server, apply Fix Pack 29 (18.104.22.168) or
Otherwise, if using embedded WebSphere Application Server packaged with
Tivoli Directory Server, apply the latest recommended eWAS fix pack.
Risk factor :
Medium / CVSS Base Score : 6.8
CVSS Temporal Score : 5.6
Public Exploit Available : true
Family: Web Servers
Nessus Plugin ID: 56683 ()
Bugtraq ID: 3701537355
CVE ID: CVE-2009-2746CVE-2009-2747CVE-2009-2748
Nessus Professional: Scan unlimited IPs, run compliance checks & moreNessus Cloud: The power of Nessus for teams – from the cloud
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.