CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
EPSS
Percentile
77.2%
IBM WebSphere Application Server 6.0.x before Fix Pack 25 appears to be running on the remote host. Such versions are reportedly affected by multiple vulnerabilities.
An unspecified vulnerability in the Administrative Console involving monitor role users. (PK45768)
WebSphere Application Server writes unspecified plaintext information to ‘http_plugin.log’ which might allow attackers to obtain sensitive information.
(PK48785)
An unspecified vulnerability in the ‘PropFilePasswordEncoder’ utility. (PK52709)
A header buffer-handling vulnerability with unspecified impact. (PK57746)
An unspecified vulnerability in the ‘UOWManager’.
(PK51392)
#
# (C) Tenable Network Security, Inc.
#
include("compat.inc");
if (description)
{
script_id(45419);
script_version("1.12");
script_cvs_date("Date: 2018/08/06 14:03:16");
script_cve_id("CVE-2007-6679", "CVE-2008-0740", "CVE-2008-0741");
script_bugtraq_id(27400);
script_xref(name:"Secunia", value:"28588");
script_name(english:"IBM WebSphere Application Server 6.0 < 6.0.2.25 Multiple Vulnerabilities");
script_summary(english:"Reads the version number from the SOAP port");
script_set_attribute(attribute:"synopsis", value:
"The remote application server is affected by multiple
vulnerabilities.");
script_set_attribute(attribute:"description", value:
"IBM WebSphere Application Server 6.0.x before Fix Pack 25 appears to
be running on the remote host. Such versions are reportedly affected
by multiple vulnerabilities.
- An unspecified vulnerability in the Administrative
Console involving monitor role users. (PK45768)
- WebSphere Application Server writes unspecified
plaintext information to 'http_plugin.log' which might
allow attackers to obtain sensitive information.
(PK48785)
- An unspecified vulnerability in the
'PropFilePasswordEncoder' utility. (PK52709)
- A header buffer-handling vulnerability with unspecified
impact. (PK57746)
- An unspecified vulnerability in the 'UOWManager'.
(PK51392)");
script_set_attribute(attribute:"see_also", value:"http://www-1.ibm.com/support/docview.wss?uid=swg27006876#60225");
script_set_attribute(attribute:"solution", value:"Apply Fix Pack 25 (6.0.2.25) or later.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_cwe_id(264);
script_set_attribute(attribute:"vuln_publication_date", value:"2008/12/22");
script_set_attribute(attribute:"patch_publication_date", value:"2008/12/21");
script_set_attribute(attribute:"plugin_publication_date", value:"2010/04/05");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_set_attribute(attribute:"cpe", value:"cpe:/a:ibm:websphere_application_server");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Web Servers");
script_copyright(english:"This script is Copyright (C) 2010-2018 Tenable Network Security, Inc.");
script_dependencies("websphere_detect.nasl");
script_require_ports("Services/www", 8880, 8881);
script_require_keys("www/WebSphere");
exit(0);
}
include("global_settings.inc");
include("misc_func.inc");
include("http.inc");
port = get_http_port(default:8880);
version = get_kb_item("www/WebSphere/"+port+"/version");
if (isnull(version)) exit(1, "Failed to extract the version from the IBM WebSphere Application Server instance listening on port " + port + ".");
if (version =~ "^[0-9]+(\.[0-9]+)?$")
exit(1, "Failed to extract a granular version from the IBM WebSphere Application Server instance listening on port " + port + ".");
ver = split(version, sep:'.', keep:FALSE);
for (i=0; i<max_index(ver); i++)
ver[i] = int(ver[i]);
if (
(ver[0] == 6 && ver[1] == 0 && ver[2] < 2) ||
(ver[0] == 6 && ver[1] == 0 && ver[2] == 2 && ver[3] < 25)
)
{
if (report_verbosity > 0)
{
source = get_kb_item_or_exit("www/WebSphere/"+port+"/source");
report =
'\n Source : ' + source +
'\n Installed version : ' + version +
'\n Fixed version : 6.0.2.25' +
'\n';
security_hole(port:port, extra:report);
}
else security_hole(port);
exit(0);
}
else exit(0, "The WebSphere Application Server "+version+" instance listening on port "+port+" is not affected.");