IBM WebSphere Application Server 6.1 < Multiple Vulnerabilities

This script is Copyright (C) 2010-2016 Tenable Network Security, Inc.

Synopsis :

The remote application server is affected by multiple vulnerabilities.

Description :

IBM WebSphere Application Server 6.1 before Fix Pack 33 appears to be
running on the remote host. As such, it is reportedly affected by
multiple vulnerabilities :

- An unspecified cross-site scripting vulnerability
exists in the Administration Console. (PM09250,

- An unspecified error exists when a Java API for XML Web
Services (JAX-WS) application with the WS-Security policy
specifies a Time Stamp value. (PM16014 / PM08360)

- Sensitive information is stored by
'ceiDbPasswordDefaulter' in the
'<WAS_HOME>/logs/managedprofiles/*_create.log file.

- When security tracing is enabled, it is possible for a
NullPointerException to be thrown when calling a
logout on a LoginContext. (PM02636)

See also :

Solution :

If using WebSphere Application Server, apply Fix Pack 33 ( or

Otherwise, if using embedded WebSphere Application Server packaged with
Tivoli Directory Server, apply the latest recommended eWAS fix pack.

Risk factor :

Critical / CVSS Base Score : 10.0
CVSS Temporal Score : 8.7
Public Exploit Available : false

Family: Web Servers

Nessus Plugin ID: 49691 ()

Bugtraq ID: 41148

CVE ID: CVE-2010-0778

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now