IBM WebSphere MQ 7.1 < / 7.5 < Multiple Vulnerabilities

medium Nessus Plugin ID 73103


The remote Windows host has a service installed that is affected by multiple vulnerabilities.


The version of IBM WebSphere MQ server 7.1 / 7.5 installed on the remote Windows host is missing fix pack / or later. It is, therefore, affected by the following vulnerabilities :

- An information disclosure vulnerability exists due to a failure to sanitize user-supplied input in the MQ Telemetry component, resulting in path traversal outside of a restricted path. A remote attacker can exploit this, using a URI request, to view any file readable by the 'mqm' user. (CVE-2013-4054)

- An unspecified information disclosure vulnerability exists in IBM Java related to the Libraries component.
A remote attacker can exploit this to obtain sensitive information. (CVE-2013-5780)

Note that the fix list for fix pack shows that several APARs have a security or integrity exposure (IC93986, IC94287, IC94453, IC94752, IC97555). It is not known whether any of these APARs correspond with the information disclosure vulnerability in the Telemetry component or to what extent they represent actual security issues.


Apply fix pack / or later.

See Also

Plugin Details

Severity: Medium

ID: 73103

File Name: websphere_mq_7503.nasl

Version: 1.6

Type: local

Agent: windows

Family: Windows

Published: 5/19/2014

Updated: 8/6/2018

Supported Sensors: Nessus Agent, Nessus

Risk Information


Risk Factor: Low

Score: 3.4


Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.2

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Information

CPE: cpe:/a:ibm:websphere_mq

Required KB Items: installed_sw/IBM WebSphere MQ

Exploit Ease: No known exploits are available

Patch Publication Date: 2/3/2014

Vulnerability Publication Date: 10/15/2013

Reference Information

CVE: CVE-2013-4054, CVE-2013-5780

BID: 65897, 63115