CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
EPSS
Percentile
65.6%
IBM WebSphere Application Server 6.1 before Fix Pack 29 appears to be running on the remote host. As such, it is reportedly affected by multiple vulnerabilities :
A cross-site request forgery vulnerability exists due to insufficient validation of user-supplied input by the administrative console. (PK87176)
Due to an error in Java Naming and Directory Interface, it may be possible to obtain sensitive information.
(PK91414)
The administrative console is affected by a cross-site scripting vulnerability. (PK92057)
#
# (C) Tenable Network Security, Inc.
#
include("compat.inc");
if (description)
{
script_id(56683);
script_version("1.7");
script_cvs_date("Date: 2018/08/06 14:03:16");
script_cve_id("CVE-2009-2746", "CVE-2009-2747", "CVE-2009-2748");
script_bugtraq_id(37015, 37355);
script_name(english:"IBM WebSphere Application Server < 6.1.0.29 Multiple Vulnerabilities");
script_summary(english:"Reads the version number from the SOAP port");
script_set_attribute(attribute:"synopsis", value:
"The remote application server is affected by multiple vulnerabilities.");
script_set_attribute(attribute:"description", value:
"IBM WebSphere Application Server 6.1 before Fix Pack 29 appears to be
running on the remote host. As such, it is reportedly affected by
multiple vulnerabilities :
- A cross-site request forgery vulnerability exists due
to insufficient validation of user-supplied input by
the administrative console. (PK87176)
- Due to an error in Java Naming and Directory Interface,
it may be possible to obtain sensitive information.
(PK91414)
- The administrative console is affected by a
cross-site scripting vulnerability. (PK92057)");
script_set_attribute(attribute:"see_also",value:"http://www-01.ibm.com/support/docview.wss?uid=swg21404665");
script_set_attribute(attribute:"see_also",value:"http://www-01.ibm.com/support/docview.wss?uid=swg27009778");
script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?uid=swg27007951#61029");
script_set_attribute(attribute:"solution", value:
"If using WebSphere Application Server, apply Fix Pack 29 (6.1.0.29) or
later.
Otherwise, if using embedded WebSphere Application Server packaged with
Tivoli Directory Server, apply the latest recommended eWAS fix pack.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_cwe_id(352);
script_set_attribute(attribute:"vuln_publication_date", value:"2009/11/13");
script_set_attribute(attribute:"patch_publication_date", value:"2010/01/18");
script_set_attribute(attribute:"plugin_publication_date", value:"2011/10/31");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_set_attribute(attribute:"cpe", value:"cpe:/a:ibm:websphere_application_server");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Web Servers");
script_copyright(english:"This script is Copyright (C) 2011-2018 Tenable Network Security, Inc.");
script_dependencies("websphere_detect.nasl");
script_require_ports("Services/www", 8880, 8881);
script_require_keys("www/WebSphere");
exit(0);
}
include("global_settings.inc");
include("misc_func.inc");
include("http.inc");
port = get_http_port(default:8880, embedded:0);
version = get_kb_item("www/WebSphere/"+port+"/version");
if (isnull(version)) exit(1, "Failed to extract the version from the IBM WebSphere Application Server instance listening on port " + port + ".");
if (version =~ "^[0-9]+(\.[0-9]+)?$")
exit(1, "Failed to extract a granular version from the IBM WebSphere Application Server instance listening on port " + port + ".");
ver = split(version, sep:'.', keep:FALSE);
for (i=0; i<max_index(ver); i++)
ver[i] = int(ver[i]);
if (ver[0] == 6 && ver[1] == 1 && ver[2] == 0 && ver[3] < 29)
{
set_kb_item(name:'www/'+port+'/XSS', value:TRUE);
if (report_verbosity > 0)
{
source = get_kb_item_or_exit("www/WebSphere/"+port+"/source");
report =
'\n Source : ' + source +
'\n Installed version : ' + version +
'\n Fixed version : 6.1.0.29' +
'\n';
security_warning(port:port, extra:report);
}
else security_warning(port);
exit(0);
}
else exit(0, "The WebSphere Application Server "+version+" instance listening on port "+port+" is not affected.");
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2746
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2747
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2748
www-01.ibm.com/support/docview.wss?uid=swg21404665
www-01.ibm.com/support/docview.wss?uid=swg27007951#61029
www-01.ibm.com/support/docview.wss?uid=swg27009778