IBM WebSphere Application Server 6.1 < 6.1.0.31 Multiple Vulnerabilities

medium Nessus Plugin ID 45430

Synopsis

The remote application server is affected by multiple vulnerabilities.

Description

IBM WebSphere Application Server 6.1 before Fix Pack 31 appears to be running on the remote host. As such, it is reportedly affected by multiple vulnerabilities :

- It is possible for Administrator role members to modify primary administrative id via the administrative console. (PK88606)

- An unspecified cross-site scripting vulnerability in the Administration Console. (PK97376)

- An error when defining a wsadmin scripting 'J2CConnectionFactory' object results in passwords being stored unencrypted in the resources.xml file. (PK95089)

- An error related to the ORB ListenerThread could allow remote, authenticated users to cause a denial of service.
(PK93653)

- An information disclosure vulnerability in SIP logging could allow a local, authenticated attacker to gain access to sensitive information. (PM08892)

- An information disclosure vulnerability exists when the '-trace' option (aka debugging mode) is enabled since WAS executes debugging statements that print string representations of unspecified objects. (PM06839)

- The Web Container does not properly handle long filenames, which may cause it to respond with the incorrect file, resulting in the disclosure of potentially sensitive information. (PM06111)

- An error occurs when the Web Contained calls response.sendRedirect with a Transfer-Encoding:
chunked, which could cause a denial of service.
(PM08760)

- WS-Security processing problems with PKIPath and PKCS#7 tokens could lead to a security bypass vulnerability. (PK96427)

- An Out-Of-Memory condition related to the Deployment Manager and nodeagent could lead to a denial of service. (PM05663)

Solution

If using WebSphere Application Server, apply Fix Pack 31 (6.1.0.31) or later.

Otherwise, if using embedded WebSphere Application Server packaged with Tivoli Directory Server, apply the latest recommended eWAS fix pack.

See Also

http://www-01.ibm.com/support/docview.wss?uid=swg21404665

http://www-01.ibm.com/support/docview.wss?uid=swg27009778

http://www-01.ibm.com/support/docview.wss?uid=swg27004980

http://www-01.ibm.com/support/docview.wss?uid=swg1PK88606

http://www-01.ibm.com/support/docview.wss?rs=180&uid=swg27007951#61031

Plugin Details

Severity: Medium

ID: 45430

File Name: websphere_6_1_0_31.nasl

Version: 1.19

Type: remote

Family: Web Servers

Published: 4/6/2010

Updated: 8/6/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.0

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.2

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Information

CPE: cpe:/a:ibm:websphere_application_server

Required KB Items: www/WebSphere

Exploit Ease: No known exploits are available

Patch Publication Date: 3/29/2009

Vulnerability Publication Date: 3/29/2010

Reference Information

CVE: CVE-2010-0768, CVE-2010-0769, CVE-2010-0770, CVE-2010-0774, CVE-2010-0775, CVE-2010-0776, CVE-2010-0777, CVE-2010-1650, CVE-2010-1651, CVE-2011-1312

BID: 39051, 39056, 39567, 39701, 40277, 40321, 40322, 40325

Secunia: 39140, 39838