This script is Copyright (C) 2017 Tenable Network Security, Inc.
A message queuing service installed on the remote host is affected by
According to its self-reported version, the IBM WebSphere MQ server
installed on the remote Windows host is 9.0.1 or 9.0.2 prior to 9.0.3.
It is, therefore, affected by multiple vulnerabilities :
- An information disclosure vulnerability exists due to
the insecure transmission of credentials in cleartext. A
man-in-the-middle attacker can exploit this to disclose
password information. Note that the software is only
affected when PASSWORDPROTECTION=ALWAYS is set in
- An information disclosure vulnerability exists in
WebSphere Application server traces when establishing
CLIENT transport mode connections. A local attacker can
exploit this to disclose sensitive information including
- A denial of service vulnerability exists due to improper
handling of invalid messages. An authenticated, remote
attacker can exploit this to cause an SDR or CLUSSDR
channel to stop processing messages.
See also :
Upgrade to WebSphere MQ version 9.0.3 or later.
Risk factor :
Medium / CVSS Base Score : 4.3
CVSS Temporal Score : 3.6
Public Exploit Available : true