IBM WebSphere eXtreme Scale 8.6.1.0 < 8.6.1.6 (7247893)

high Nessus Plugin ID 270347

Synopsis

The remote web application server is affected by a vulnerability

Description

The version of IBM WebSphere eXtreme Scale installed on the remote host is prior to 8.6.1.6 IBM. It is, therefore, affected by a vulnerability as referenced in the 7247893 advisory.

- Relative Path Traversal vulnerability in Apache Commons VFS before 2.10.0. The FileObject API in Commons VFS has a 'resolveFile' method that takes a 'scope' parameter. Specifying 'NameScope.DESCENDENT' promises that an exception is thrown if the resolved file is not a descendent of the base file. However, when the path contains encoded .. characters (for example, %2E%2E/bar.txt), it might return file objects that are not a descendent of the base file, without throwing an exception. This issue affects Apache Commons VFS: before 2.10.0. Users are recommended to upgrade to version 2.10.0, which fixes the issue.
(CVE-2025-27553)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Please see vendor advisory for details.

See Also

https://www.ibm.com/support/pages/node/7247893

Plugin Details

Severity: High

ID: 270347

File Name: ibm_websphere_xsld_7247893.nasl

Version: 1.1

Type: local

Agent: unix

Family: Web Servers

Published: 10/14/2025

Updated: 10/14/2025

Configuration: Enable paranoid mode

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: High

Base Score: 7.8

Temporal Score: 5.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:N/A:N

CVSS Score Source: CVE-2025-27553

CVSS v3

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:ibm:websphere_extreme_scale

Required KB Items: Settings/ParanoidReport, installed_sw/IBM WebSphere eXtreme Scale

Exploit Ease: No known exploits are available

Patch Publication Date: 10/14/2025

Vulnerability Publication Date: 3/23/2025

Reference Information

CVE: CVE-2025-27553