Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

IBM WebSphere Application Server 7.0.0.x < Multiple Vulnerabilities



The remote host is running an application server that is vulnerable to multiple attack vectors.


The remote host appears to be running IBM WebSphere Application Server 7.0.0.x prior to and is affected by multiple vulnerabilities :

- An unspecified flaw exists that is triggered when handling a specially crafted HTTP method. This may allow a remote attacker to gain access to potentially sensitive cookie and authentication data, which can allow the attacker conduct further, more serious attacks on the system. (CVE-2014-3021) - A flaw exists in the administrative console that allows a stored cross-site scripting (XSS) attack. This flaw exists because the program does not validate input before returning it to users. This may allow an authenticated remote attacker to create a specially crafted request that would execute arbitrary script code in a user's browser session within the trust relationship between their browser and the server. (CVE-2014-4770) - A flaw exists in the administrative console as HTTP requests do not require multiple steps, explicit confirmation, or a unique token when performing certain sensitive actions. By tricking a user into following a specially crafted link, a context-dependent attacker can perform a Cross-Site Request Forgery (CSRF / XSRF) attack causing the victim to perform unspecified actions. (CVE-2014-4816) - An XXE (Xml eXternal Entity) injection flaw exists in the Communications Enabled Applications (CEA) service that is triggered during the parsing of XML data. The issue is due to an incorrectly configured XML parser accepting XML external entities from an untrusted source. By sending specially crafted XML data, a remote attacker can gain access to potentially sensitive information. (CVE-2014-6166)


Upgrade WebSphere Application Server to or later.