IBM WebSphere Application Server 7.0 < Fix Pack 37 Multiple Vulnerabilities (POODLE)

medium Nessus Plugin ID 81825

Synopsis

The remote application server is affected by multiple vulnerabilities.

Description

The IBM WebSphere Application Server running on the remote host is version 7.0 prior to Fix Pack 37. It is, therefore, affected by the following vulnerabilities :

- A man-in-the-middle (MitM) information disclosure vulnerability known as POODLE. The vulnerability is due to the way SSL 3.0 handles padding bytes when decrypting messages encrypted using block ciphers in cipher block chaining (CBC) mode. MitM attackers can decrypt a selected byte of a cipher text in as few as 256 tries if they are able to force a victim application to repeatedly send the same data over newly created SSL 3.0 connections. (CVE-2014-3566 / PI27101)

- An input validation error exists related to session input using URL rewriting that can allow cross-site scripting attacks. (CVE-2014-6167 / PI23819)

- An error exists related to the administrative console that can allow 'click-jacking' attacks.
(CVE-2014-6174 / PI27152)

- Multiple errors exist in the bundled IBM Java SDK. These errors are corrected by the October 2014 IBM Java SDK updates. (CVE-2014-6457, CVE-2014-6512, CVE-2014-6558 / PI27101)

- Multiple errors exist in the bundled IBM Java SDK. These errors are corrected by the January 2015 IBM Java SDK updates. (CVE-2014-6593, CVE-2015-0400, CVE-2015-0410) / PI33407

Solution

Apply Fix Pack 37 (7.0.0.37) or later.

Note that interim fixes are available. Refer to the vendor security advisory for interim fix identifiers.

See Also

https://www-304.ibm.com/support/docview.wss?uid=swg21687740

http://www-01.ibm.com/support/docview.wss?uid=swg21695362

https://www.imperialviolet.org/2014/10/14/poodle.html

https://www.openssl.org/~bodo/ssl-poodle.pdf

https://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00

http://www-01.ibm.com/support/docview.wss?uid=swg27014463#70037

http://www-01.ibm.com/support/docview.wss?uid=swg24039338

Plugin Details

Severity: Medium

ID: 81825

File Name: websphere_7_0_0_37.nasl

Version: 1.10

Type: remote

Family: Web Servers

Published: 3/17/2015

Updated: 11/22/2019

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.1

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS Score Source: CVE-2015-0400

Vulnerability Information

CPE: cpe:/a:ibm:websphere_application_server

Required KB Items: www/WebSphere

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 3/13/2015

Vulnerability Publication Date: 10/14/2014

Reference Information

CVE: CVE-2014-3566, CVE-2014-6167, CVE-2014-6174, CVE-2014-6457, CVE-2014-6512, CVE-2014-6558, CVE-2014-6593, CVE-2015-0400, CVE-2015-0410

BID: 70239, 70538, 70544, 70567, 70574, 71850, 72159, 72165, 72169

CERT: 577193