VID |
22535 |
Severity |
30 |
Port |
8880, ... |
Protocol |
TCP |
Class |
WWW |
Detailed Description |
IBM WebSphere Application Server 7.0 before Fix Pack 19 appears to be running on the remote host. As such, it is potentially affected by the following vulnerabilities :
- An open redirect vulnerability exists related to the 'logoutExitPage' parameter. This can allow remote attackers to trick users into requesting unintended URLs. (PM35701)
- The administrative console can display a stack trace under unspecified circumstances and can disclose potentially sensitive information to local users. (PM36620)
- A token verification error exists in the bundled OpenSAML library. This error can allow an attacker to bypass security controls with an XML signature wrapping attack via SOAP messages. (PM43254)
- A directory traversal attack is possible via unspecified parameters in the 'help' servlet. (PM45322)
* References: http://www-01.ibm.com/support/docview.wss?rs=180&uid=swg27014463#70019 http://www-01.ibm.com/support/docview.wss?uid=swg1PM46122 http://www-01.ibm.com/support/docview.wss?uid=swg1PM46125 http://www-01.ibm.com/support/docview.wss?uid=swg1PM46125
* Note: This check solely relied on the banner of the remote Web server to assess this vulnerability, so this might be a false positive.
* Platforms Affected: IBM WebSphere Application Server versions 7.0 prior to 7.0.0.19 Fix Pack 19 |
Recommendation |
Upgrade to the latest version of IBM WebSphere Application Server 7.0 (Fix Pack 19 for 7.0 (7.0.0.19) or later), available from the IBM Support & downloads Web site at http://www-01.ibm.com/support/docview.wss?rs=180&uid=swg27014463#70019 |
Related URL |
CVE-2011-1355,CVE-2011-1356,CVE-2011-1359,CVE-2011-1411 (CVE) |
Related URL |
48709,48710,48890,49362 (SecurityFocus) |
Related URL |
(ISS) |
|