IBM WebSphere Application Server 8.0 < Fix Pack 7 Multiple Vulnerabilities

high Nessus Plugin ID 69449

Synopsis

The remote application server may be affected by multiple vulnerabilities.

Description

IBM WebSphere Application Server 8.0 before Fix Pack 7 appears to be running on the remote host. It is, therefore, potentially affected by the following vulnerabilities :

- A flaw exists related to Apache Ant and file compression that could lead to denial of service conditions. (CVE-2012-2098 / PM90088)

- The TLS protocol in the GSKIT component is vulnerable to a plaintext recovery attack.
(CVE-2013-0169 / PM85211)

- A flaw exists relating to OAuth that could allow a remote attacker to obtain someone else's credentials.
(CVE-2013-0597 / PM85834 / PM87131)

- A flaw exists relating to OpenJPA that is triggered during deserialization, which could allow a remote attacker to write to the file system and potentially execute arbitrary code. Note the vendor states this application is not directly affected by this flaw;
however, this application does include the affected version of OpenJPA. (CVE-2013-1768 / PM86780)

- An input validation flaw exists in the optional 'mod_rewrite' module in the included IBM HTTP Server that could allow arbitrary command execution via HTTP requests containing certain escape sequences.
(CVE-2013-1862 / PM87808)

- A flaw exists related to the optional 'mod_dav' module in the included IBM HTTP Server that could allow denial of service conditions.
(CVE-2013-1896 / PM89996)

- User-supplied input validation errors exist related to the administrative console that could allow cross-site scripting attacks.
(CVE-2013-2967 / PM78614, CVE-2013-4004 / PM81571, CVE-2013-4005 / PM88208)

- An information disclosure vulnerability exists related to incorrect caching by the administrative console.
(CVE-2013-2976 / PM79992)

- A user-supplied input validation error exists that could allow cross-site request forgery (CSRF) attacks to be carried out. (CVE-2013-3029 / PM88746)

Solution

Apply Fix Pack 7 for version 8.0 (8.0.0.7) or later.

See Also

http://www.nessus.org/u?187690fd

http://www-01.ibm.com/support/docview.wss?uid=swg21644047

http://www-01.ibm.com/support/docview.wss?uid=swg24035457

http://www.nessus.org/u?b1c66192

Plugin Details

Severity: High

ID: 69449

File Name: websphere_8_0_0_7.nasl

Version: 1.20

Type: remote

Family: Web Servers

Published: 8/23/2013

Updated: 12/5/2022

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2013-1768

Vulnerability Information

CPE: cpe:/a:ibm:websphere_application_server

Required KB Items: www/WebSphere

Exploit Ease: No known exploits are available

Patch Publication Date: 8/19/2013

Vulnerability Publication Date: 5/23/2012

Reference Information

CVE: CVE-2012-2098, CVE-2013-0169, CVE-2013-0597, CVE-2013-1768, CVE-2013-1862, CVE-2013-1896, CVE-2013-2967, CVE-2013-2976, CVE-2013-3029, CVE-2013-4004, CVE-2013-4005

BID: 53676, 57778, 59826, 60534, 60724, 61129, 61901, 61935, 61937, 61940, 61941

CWE: 20, 442, 629, 711, 712, 722, 725, 74, 750, 751, 79, 800, 801, 809, 811, 864, 900, 928, 931, 990