How to Buy
This script is Copyright (C) 2013-2016 Tenable Network Security, Inc.
The remote application server may be affected by multiple
IBM WebSphere Application Server 7.0 before Fix Pack 27 appears to be
running on the remote host. It is, therefore, potentially affected by
the following vulnerabilities :
- A request validation error exists related to the proxy
server component that could allow a remote attacker to
cause the proxy status to be reported as disabled, thus
denying applications access to the proxy.
- A user-supplied input validation error exists that could
allow cross-site request forgery (CSRF) attacks to be
carried out. (CVE-2012-4853, PM62920)
- Unspecified errors exist related to the administration
console that could allow cross-site scripting attacks.
(CVE-2013-0458, CVE-2013-0459, CVE-2013-0460, PM71139,
- An unspecified error exists related to the
administration console for 'virtual member manager'
(VMM) that can allow cross-site scripting.
See also :
If using WebSphere Application Server, apply Fix Pack 27 (188.8.131.52) or
Otherwise, if using embedded WebSphere Application Server packaged with
Tivoli Directory Server, contact the vendor for more information as IBM
currently has not a published fix pack 27 for that.
Risk factor :
Medium / CVSS Base Score : 4.3
CVSS Temporal Score : 3.2
Public Exploit Available : false
Family: Web Servers
Nessus Plugin ID: 64097 ()
Bugtraq ID: 564585645957508575095751057512
CVE ID: CVE-2012-3330CVE-2012-4853CVE-2013-0458CVE-2013-0459CVE-2013-0460CVE-2013-0461
Nessus Professional: Scan unlimited IPs, run compliance checks & moreNessus Cloud: The power of Nessus for teams – from the cloud
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.