IBM WebSphere Application Server < Multiple Vulnerabilities

high Nessus Plugin ID 45422


The remote application server is affected by multiple vulnerabilities.


IBM WebSphere Application Server 6.1 before Fix Pack 15 appears to be running on the remote host. As such, it is reportedly affected by the following vulnerabilities :

- There is an as-yet unspecified security exposure in wsadmin (PK45726).

- Sensitive information might appear in plaintext in the http_plugin.log file (PK48785).

- There is an as-yet unspecified potential security exposure in the 'PropFilePasswordEncoder' utility (PK52709).

- There is an as-yet unspecified potential security exposure with 'serveServletsByClassnameEnabled' (PK52059).

- Sensitive information may appear in plaintext in startserver.log (PK53198).

- If Fix Pack 9 has been installed, attackers can perform an internal application hashtable login by either not providing a password or providing an empty password when the JAAS Login functionality is enabled.


If using WebSphere Application Server, apply Fix Pack 15 ( or later.

Otherwise, if using embedded WebSphere Application Server packaged with Tivoli Directory Server, apply the latest recommended eWAS fix pack.

See Also

Plugin Details

Severity: High

ID: 45422

File Name: websphere_6_1_0_15.nasl

Version: 1.22

Type: remote

Family: Web Servers

Published: 4/5/2010

Updated: 8/6/2018

Supported Sensors: Nessus

Risk Information


Risk Factor: Low

Score: 3.4


Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/a:ibm:websphere_application_server

Required KB Items: www/WebSphere

Exploit Ease: No known exploits are available

Patch Publication Date: 3/10/2008

Vulnerability Publication Date: 3/12/2008

Reference Information

CVE: CVE-2008-0740, CVE-2008-7274

BID: 27400, 28216, 46449

CWE: 264

Secunia: 29335