IBM WebSphere Application Server < Multiple Vulnerabilities

High Nessus Plugin ID 36132


The remote application server is affected by multiple vulnerabilities.


IBM WebSphere Application Server 6.0.2 before Fix Pack 33 appears to be running on the remote host. As such, it is reportedly affected by multiple vulnerabilities :

- Provided an attacker has valid credentials, it may be possible to hijack an authenticated session. (PK66676)

- The PerfServlet code writes sensitive information in the 'systemout.log' and ffdc files, provided Performance Monitoring Infrastructure (PMI) is enabled.

- It may be possible to login to the administrative console using a user account that is locked by the operating system. (PK67909)

- An unknown vulnerability affects z/OS-based IBM WebSphere application servers. (PK71143)

- An unspecified vulnerability in the administrative console could allow arbitrary file retrieval from the remote system. (PK72036)

- If APAR PK41002 has been applied, a vulnerability in the JAX-RPC WS-Security component could incorrectly validate 'UsernameToken'. (PK75992)

- Certain files associated with interim fixes for Unix- based versions of IBM WebSphere Application Server are built with insecure file permissions. (PK78960)


Apply Fix Pack 33 ( or later.

See Also

Plugin Details

Severity: High

ID: 36132

File Name: websphere_6_0_2_33.nasl

Version: $Revision: 1.15 $

Type: remote

Family: Web Servers

Published: 2009/04/10

Modified: 2013/04/16

Dependencies: 57034

Risk Information

Risk Factor: High


Base Score: 7.5

Temporal Score: 6.2

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:ibm:websphere_application_server

Required KB Items: www/WebSphere

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2009/02/13

Reference Information

CVE: CVE-2009-0891, CVE-2009-0506

BID: 33884, 34330, 35610

OSVDB: 52596, 52608

Secunia: 34038

CWE: 287