IBM WebSphere Application Server 6.1 < Multiple Vulnerabilities

medium Nessus Plugin ID 53475


The remote application server is affected by multiple vulnerabilities.


IBM WebSphere Application Server 6.1 before Fix Pack 37 appears to be running on the remote host. As such, it is potentially affected by the following vulnerabilities :

- It is possible to trigger a DoS condition via SAAJ API provided by the WebSphere Web services runtime.

- An unspecified cross-site scripting vulnerability exists in the IVT application. (PM20393)

- The AuthCache purge implementation is not able to purge a user in AuthCache. (PM24668)

- A remote attacker can gain unspecified application access on z/OS, when a Local OS user registry or Federated Repository with RACF adapter is used. (PM35478)


If using WebSphere Application Server, apply Fix Pack 37 ( or later.

Otherwise, if using embedded WebSphere Application Server packaged with Tivoli Directory Server, apply the latest recommended eWAS fix pack.

See Also

Plugin Details

Severity: Medium

ID: 53475

File Name: websphere_6_1_0_37.nasl

Version: 1.15

Type: remote

Family: Web Servers

Published: 4/18/2011

Updated: 11/15/2018

Supported Sensors: Nessus

Risk Information


Risk Factor: Medium

Score: 5.8


Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/a:ibm:websphere_application_server

Required KB Items: www/WebSphere

Exploit Ease: No known exploits are available

Patch Publication Date: 4/4/2011

Vulnerability Publication Date: 3/31/2011

Reference Information

CVE: CVE-2011-1308, CVE-2011-1321, CVE-2011-1322, CVE-2011-1683

BID: 46736, 47122

CWE: 20, 442, 629, 711, 712, 722, 725, 74, 750, 751, 79, 800, 801, 809, 811, 864, 900, 928, 931, 990

Secunia: 44031