IBM WebSphere Application Server 6.1 < Multiple Vulnerabilities

This script is Copyright (C) 2011-2013 Tenable Network Security, Inc.

Synopsis :

The remote application server is affected by multiple vulnerabilities.

Description :

IBM WebSphere Application Server 6.1 before Fix Pack 39 appears to be
running on the remote host. As such, it is potentially affected by
the following vulnerabilities :

- Use of an insecure XML encryption algorithm could allow
for decryption of JAX-RPC or JAX-WS Web Services
requests. (PM34841)

- An error exists in the validation of the
'logoutExitPage' parameter that can allow a remote
attacker to bypass security restrictions and redirect
users in support of a phishing attack. (PM35701)

- An error exists in the handling of administration
console requests. This error can allow a local attacker
to use a specially crafted request to view sensitive
stack-trace information. (PM36620)

See also :

Solution :

If using WebSphere Application Server, apply Fix Pack 39 ( or

Otherwise, if using embedded WebSphere Application Server packaged with
Tivoli Directory Server, apply the latest recommended eWAS fix pack.

Risk factor :

Medium / CVSS Base Score : 5.8
CVSS Temporal Score : 4.3
Public Exploit Available : false

Family: Web Servers

Nessus Plugin ID: 55649 ()

Bugtraq ID: 47831

CVE ID: CVE-2011-1209

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now