This script is Copyright (C) 2017 Tenable Network Security, Inc.
A message queuing application installed on the remote Windows host is
affected by multiple information disclosure vulnerabilities.
The version of IBM MQ (formerly IBM WebSphere MQ) 8.x installed on
the remote Windows host is missing fix pack 22.214.171.124 or later. It is,
therefore, affected by the following vulnerabilities :
- A flaw exists in the Advanced Message Security policy
when a JMS client application sends a message to the
queue using this policy. Under certain circumstances,
a cleartext duplicate copy of the message could be
created outside the protected payload. An
authenticated, remote attacker can exploit this, using
man-in-the-middle techniques, to disclose sensitive
- A flaw exists in the MQ Explorer implementation in
authentication credential handling due to the server
transmitting authentication credentials in cleartext
even if the server has been configured to protect
passwords. An unauthenticated, remote attacker can
can exploit this, using man-in-the-middle techniques,
to disclose authentication credentials.
Note that Nessus has not tested for these issues but has instead
relied only on the application's self-reported version number.
See also :
Apply fix pack 126.96.36.199 or later.
Risk factor :
Medium / CVSS Base Score : 4.3
CVSS Temporal Score : 3.7
Public Exploit Available : true