icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons_061

IBM WebSphere Application Server < 6.0.2.33 Multiple Vulnerabilities

High

Synopsis

The remote host is vulnerable to multiple attack vectors.

Description

IBM WebSphere Application Server 6.0.2 before Fix Pack 33 appears to be running on the remote host. Such versions are reportedly affected by multiple vulnerabilities :

- Provided an attacker has valid credentials, it may be possible to hijack an authenticated session. (PK66676)

- The PerfServlet code writes sensitive information in the 'systemout.log' and ffdc files, provided Performance Monitoring Infrastructure (PMI) is enabled. (PK63886)

- It may be possible to login to the administrative console using a user account that is locked by the operating system. (PK67909)

- An unknown vulnerability affects z/OS-based IBM WebSphere application servers. (PK71143)

- An unspecified vulnerability in the administrative console could allow arbitrary file retrieval from the remote system. (PK72036)

- If APAR PK41002 has been applied, an unspecified vulnerability in JAX-RPC WS-Security component could incorrectly validate 'UsernameToken'. (PK75992)

- Certain files associated with interim fixes for Unix-based versions of IBM WebSphere Application Server are built with insecure file permissions. (PK78960)

Solution

Apply Fix Pack 33 (6.0.2.33) or higher.