Korean
<< Back
VID 22536
Severity 40
Port 8880, ...
Protocol TCP
Class WWW
Detailed Description IBM WebSphere Application Server 8.0 before Fix Pack 1 appears to be
running on the remote host and is potentially affected by the
following vulnerabilities :

- An open redirect vulnerability exists related to the
'logoutExitPage' parameter. This can allow remote
attackers to trick users into requesting unintended
URLs. (PM35701)

- The administrative console can display a stack trace
under unspecified circumstances and can disclose
potentially sensitive information to local users.
(PM36620)

- An unspecified error exists that can allow cross-site
request forgery attacks. (PM36734)

- A token verification error exists in the bundled
OpenSAML library. This error can allow an attacker to
bypass security controls with an XML signature wrapping
attack via SOAP messages. (PM43254)

- A directory traversal attack is possible via unspecified
parameters in the 'help' servlet. (PM45322)

- The HTTP server contains an error in the 'ByteRange'
filter and can allow denial of service attacks when
processing malicious requests. (PM46234)

* References:
http://www.ibm.com/support/docview.wss?uid=swg27022958
http://www-01.ibm.com/support/docview.wss?uid=swg24030916
http://www-01.ibm.com/support/docview.wss?uid=swg21512087

* Note: This check solely relied on the banner of the remote Web server to assess this vulnerability, so this might be a false positive.

* Platforms Affected:
IBM WebSphere Application Server versions 8.0 prior to 8.0 Fix Pack 1
Recommendation Upgrade to the latest version of IBM WebSphere Application Server 8.0 (Fix Pack 1 for 8.0 (8.0.0.1) or later), available from the IBM Support & downloads Web site at http://www.ibm.com/support/docview.wss?uid=swg27022958
Related URL CVE-2011-1355,CVE-2011-1356,CVE-2011-1359,CVE-2011-3192,CVE-2011-1411 (CVE)
Related URL 48709,48710,48890,49303,49362,49766 (SecurityFocus)
Related URL (ISS)