IBM WebSphere Application Server 7.0 < Fix Pack 15 Multiple Vulnerabilities

high Nessus Plugin ID 52615


The remote application server is affected by multiple vulnerabilities.


IBM WebSphere Application Server 7.0 before Fix Pack 15 appears to be running on the remote host. As such, it is reportedly affected by the following vulnerabilities :

- A double free error in BBOOORBR control block could trigger a denial of service condition. (PM17170)

- A cross-site scripting vulnerability exists in the web container. (PM18512)

- It is possible for authenticated users to trigger a DoS condition by using Lightweight Third-Party Authentication (LTPA) tokens for authentication.

- Sensitive wsadmin command parameters are included in trace files, which could result in an information disclosure vulnerability. (PM18736)

- A memory leak in '' could trigger a DoS condition. (PM19500)

- It is possible to trigger a DoS condition via SAAJ API provided by the WebSphere Web services runtime.

- The Service Integration Bus (SIB) messaging engine is affected by a DoS issue. (PM19834)

- The installer creates a temporary log file directory with open '777' permissions. (PM20021)

- A cross-site scripting vulnerability exists in the IVT application.(PM20393)

- User credentials are not cleared from the cache, even after an user has logged out. (PM21536)

- Trace requests are not handled correctly, which could result in an unspecified issue. (PM22860)

- A memory leak in 'org.apache.jasper.runtime.JspWriterImpl.response' could trigger a denial of service condition. (PM23029)

- Under certain conditions, SIP proxy may stop processing UDP messages, resulting in a DoS condition. (PM23115)

- Memory leak in the messaging engine could trigger a denial of service condition. (PM23626)

- Improper access is allowed to certain control servlets.

- The AuthCache purge implementation is not able to purge a user in AuthCache. (PM24668)

- Incorrect security role mapping could occur while using J2EE 1.4 application. (PM25455)

- It is possible for Administrator role members to modify primary administrative id via the administrative console. (PK88606)


If using WebSphere Application Server, apply Fix Pack 15 ( or later.

Otherwise, if using embedded WebSphere Application Server packaged with Tivoli Directory Server, apply the latest recommended eWAS fix pack.

See Also

Plugin Details

Severity: High

ID: 52615

File Name: websphere_7_0_0_15.nasl

Version: 1.16

Type: remote

Family: Web Servers

Published: 3/10/2011

Updated: 11/15/2018

Supported Sensors: Nessus

Risk Information


Risk Factor: Medium

Score: 5.8


Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/a:ibm:websphere_application_server

Required KB Items: www/WebSphere

Exploit Ease: No known exploits are available

Patch Publication Date: 2/28/2011

Vulnerability Publication Date: 2/28/2011

Reference Information

CVE: CVE-2011-0315, CVE-2011-0316, CVE-2011-1307, CVE-2011-1308, CVE-2011-1309, CVE-2011-1310, CVE-2011-1311, CVE-2011-1312, CVE-2011-1313, CVE-2011-1314, CVE-2011-1315, CVE-2011-1316, CVE-2011-1317, CVE-2011-1318, CVE-2011-1319, CVE-2011-1320, CVE-2011-1321, CVE-2011-1322

BID: 46736

CWE: 20, 442, 629, 711, 712, 722, 725, 74, 750, 751, 79, 800, 801, 809, 811, 864, 900, 928, 931, 990

Secunia: 42938, 43211