IBM WebSphere Application Server 7.0 < Fix Pack 17 Multiple Vulnerabilities

Medium Nessus Plugin ID 55169


The remote application server may be affected by multiple vulnerabilities.


IBM WebSphere Application Server 7.0 before Fix Pack 17 appears to be running on the remote host. As such, it is potentially affected by the following vulnerabilities :

- Use of an insecure XML encryption algorithm could allow for decryption of JAX-RPC or JAX-WS Web Services requests. (PM34841)

- A remote attacker can gain unspecified application access on z/OS, when a Local OS user registry or Federated Repository with RACF adapter is used. (PM35480)

Note that the fix for PM34841 is not enabled by default in order to maintain application compatibility with respect to SOAPFaults. To enable it, it is necessary to set the 'webservices.unify.faults=true' JVM custom property once the update has been installed.


If using WebSphere Application Server, apply Fix Pack 17 ( or later.

Otherwise, if using embedded WebSphere Application Server packaged with Tivoli Directory Server, apply the latest recommended eWAS fix pack.

See Also

Plugin Details

Severity: Medium

ID: 55169

File Name: websphere_7_0_0_17.nasl

Version: $Revision: 1.9 $

Type: remote

Family: Web Servers

Published: 2011/06/17

Modified: 2016/05/06

Dependencies: 57034

Risk Information

Risk Factor: Medium


Base Score: 6.8

Temporal Score: 5.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:ibm:websphere_application_server

Required KB Items: www/WebSphere

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2011/05/16

Vulnerability Publication Date: 2011/03/30

Reference Information

CVE: CVE-2011-1209, CVE-2011-1683

BID: 47122, 47831

OSVDB: 72300, 73289