IBM WebSphere Application Server < Multiple Flaws

This script is Copyright (C) 2009-2016 Tenable Network Security, Inc.

Synopsis :

The remote application server is affected by multiple vulnerabilities.

Description :

IBM WebSphere Application Server 6.1 before Fix Pack 23 appears to
be installed on the remote host. Such versions are reportedly affected
by multiple vulnerabilities :

- Provided an attacker has valid credentials, it may be
possible to hijack an authenticated session. (PK66676)

- It may be possible for a remote attacker to redirect
users to arbitrary sites using ibm_security_logout
servlet. (PK71126)

- Under certain conditions it may be possible to access
administrative console user sessions. (PK74966)

- If APAR PK41002 has been applied, a vulnerability in
the JAX-RPC WS-Security component could incorrectly
validate 'UsernameToken'. (PK75992)

- Sample applications shipped with IBM WebSphere
Application Server are affected by cross-site scripting
vulnerabilities. (PK76720)

- The administrative console is affected by a cross-site
scripting vulnerability. (PK77505)

- It may be possible for an attacker to read arbitrary
application-specific war files. (PK81387)

See also :

Solution :

If using WebSphere Application Server, apply Fix Pack 23 ( or

Otherwise, if using embedded WebSphere Application Server packaged with
Tivoli Directory Server, apply the latest recommended eWAS fix pack.

Risk factor :

High / CVSS Base Score : 7.5
CVSS Temporal Score : 6.2
Public Exploit Available : true

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now