Korean
<< Back
VID 22535
Severity 30
Port 8880, ...
Protocol TCP
Class WWW
Detailed Description IBM WebSphere Application Server 7.0 before Fix Pack 19 appears to be running on the remote host. As such, it is potentially affected by the following vulnerabilities :

- An open redirect vulnerability exists related to the 'logoutExitPage' parameter. This can allow remote attackers to trick users into requesting unintended URLs. (PM35701)

- The administrative console can display a stack trace under unspecified circumstances and can disclose potentially sensitive information to local users. (PM36620)

- A token verification error exists in the bundled OpenSAML library. This error can allow an attacker to bypass security controls with an XML signature wrapping attack via SOAP messages. (PM43254)

- A directory traversal attack is possible via unspecified parameters in the 'help' servlet. (PM45322)

* References:
http://www-01.ibm.com/support/docview.wss?rs=180&uid=swg27014463#70019
http://www-01.ibm.com/support/docview.wss?uid=swg1PM46122
http://www-01.ibm.com/support/docview.wss?uid=swg1PM46125
http://www-01.ibm.com/support/docview.wss?uid=swg1PM46125

* Note: This check solely relied on the banner of the remote Web server to assess this vulnerability, so this might be a false positive.

* Platforms Affected:
IBM WebSphere Application Server versions 7.0 prior to 7.0.0.19 Fix Pack 19
Recommendation Upgrade to the latest version of IBM WebSphere Application Server 7.0 (Fix Pack 19 for 7.0 (7.0.0.19) or later), available from the IBM Support & downloads Web site at http://www-01.ibm.com/support/docview.wss?rs=180&uid=swg27014463#70019
Related URL CVE-2011-1355,CVE-2011-1356,CVE-2011-1359,CVE-2011-1411 (CVE)
Related URL 48709,48710,48890,49362 (SecurityFocus)
Related URL (ISS)