How to Buy
This script is Copyright (C) 2013-2016 Tenable Network Security, Inc.
The remote application server may be affected by multiple
IBM WebSphere Application Server 6.1 before Fix Pack 47 appears to be
running on the remote host. As such, it is potentially affected by the
following vulnerabilities :
- A remote attacker can bypass authentication because of
improper user validation on Linux, Solaris, and HP-UX
platforms that use a LocalOS registry.
- A denial of service can be caused by the way Apache
Ant uses bzip2 to compress files. This can be exploited
by a local attacker passing specially crafted input.
- A local attacker can cause a denial of service on
Windows platforms with a LocalOS registry using
WebSphere Identity Manager. (CVE-2013-0541, PM74909)
- Remote attackers can traverse directories by deploying
a specially crafted application file to overwrite files
outside of the application deployment directory.
- The TLS protocol implementation is susceptible to
plaintext-recovery attacks via statistical analysis of
timing data for crafted packets. (CVE-2013-0169,
- Terminal escape sequences are not properly filtered from
logs. Remote attackers could execute arbitrary commands
via an HTTP request containing an escape sequence.
- Improper validation of user input allows for cross-site
request forgery. By persuading an authenticated user
to visit a malicious website, a remote attacker could
exploit this vulnerability to obtain sensitive
information. (CVE-2012-4853, CVE-2013-3029, PM62920,
- Improper validation of user input in the administrative
console allows for multiple cross-site scripting
attacks. (CVE-2013-0458, CVE-2013-0459, CVE-2013-0461,
CVE-2013-0542, CVE-2013-0596, CVE-2013-2967,
CVE-2013-4005, CVE-2013-4052, PM71139, PM72536, PM71389,
PM73445, PM78614, PM81846, PM88208, PM91892)
- Improper validation of portlets in the administrative
console allows for cross-site request forgery, which
could allow an attacker to obtain sensitive information.
- Remote, authenticated attackers can traverse directories
on Linux and UNIX systems running the application.
- A denial of service attack is possible if the optional
mod_dav module is being used. (CVE-2013-1896, PM89996)
- Sensitive information can be obtained by a local
attacker because of incorrect caching by the
administrative console. (CVE-2013-2976, PM79992)
- An attacker may gain elevated privileges because of
improper certificate checks. WS-Security and XML Digital
Signatures must be enabled. (CVE-2013-4053, PM90949,
- Deserialization of a maliciously crafted OpenJPA object
can result in an executable file being written to the
file system. WebSphere is NOT vulnerable to this issue
but the vendor suggests upgrading to be proactive.
(CVE-2013-1768, PM86780, PM86786, PM86788, PM86791)
See also :
If using WebSphere Application Server, apply Fix Pack 47 (22.214.171.124)
Otherwise, if using embedded WebSphere Application Server packaged with
Tivoli Directory Server, apply the latest recommended eWAS fix pack.
Risk factor :
Medium / CVSS Base Score : 6.8
CVSS Temporal Score : 5.9
Public Exploit Available : false
Family: Web Servers
Nessus Plugin ID: 70022 ()
Bugtraq ID: 53676556785645857508575095751057512575135777859247592485925059251598266053461129619016193761940619416233662338
CVE ID: CVE-2012-2098CVE-2012-3305CVE-2012-4853CVE-2013-0169CVE-2013-0458CVE-2013-0459CVE-2013-0460CVE-2013-0461CVE-2013-0462CVE-2013-0541CVE-2013-0542CVE-2013-0543CVE-2013-0544CVE-2013-0596CVE-2013-1768CVE-2013-1862CVE-2013-1896CVE-2013-2967CVE-2013-2976CVE-2013-3029CVE-2013-4005CVE-2013-4052CVE-2013-4053
Get Nessus Professional to scan unlimited IPs, run compliance checks & more
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.