CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
EPSS
Percentile
65.6%
IBM WebSphere Application Server 7.0 before Fix Pack 7 appears to be running on the remote host. As such, it is reportedly affected by multiple vulnerabilities :
A cross-site request forgery vulnerability exists due to insufficient validation of user-supplied input by the administrative console. (PK87176)
Due to an error in Java Naming and Directory Interface, it may be possible to obtain sensitive information.
(PK91414).
The administrative console is affected by a cross-site scripting vulnerability. (PK92057)
It may be possible to bypass security restrictions using a specially crafted HTTP HEAD method. (PK83258)
#
# (C) Tenable Network Security, Inc.
#
include("compat.inc");
if (description)
{
script_id(42821);
script_version("1.14");
script_cvs_date("Date: 2018/08/06 14:03:16");
script_cve_id(
"CVE-2009-2746",
"CVE-2009-2747",
"CVE-2009-2748",
"CVE-2009-3106"
);
script_bugtraq_id(37015);
script_xref(name:"Secunia", value:"37379");
script_name(english:"IBM WebSphere Application Server 7.0 < Fix Pack 7");
script_summary(english:"Reads the version number from the SOAP port");
script_set_attribute(attribute:"synopsis", value:
"The remote application server is affected by multiple vulnerabilities.");
script_set_attribute(attribute:"description", value:
"IBM WebSphere Application Server 7.0 before Fix Pack 7 appears to be
running on the remote host. As such, it is reportedly affected by
multiple vulnerabilities :
- A cross-site request forgery vulnerability exists due
to insufficient validation of user-supplied input by
the administrative console. (PK87176)
- Due to an error in Java Naming and Directory Interface,
it may be possible to obtain sensitive information.
(PK91414).
- The administrative console is affected by a
cross-site scripting vulnerability. (PK92057)
- It may be possible to bypass security restrictions
using a specially crafted HTTP HEAD method.
(PK83258)");
script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?rs=180&uid=swg27014463#7007");
script_set_attribute(attribute:"solution", value:"Apply Fix Pack 7 (7.0.0.7) or later.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_cwe_id(264, 352);
script_set_attribute(attribute:"vuln_publication_date", value:"2009/11/13");
script_set_attribute(attribute:"patch_publication_date", value:"2009/11/13");
script_set_attribute(attribute:"plugin_publication_date", value:"2009/11/13");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_set_attribute(attribute:"cpe", value:"cpe:/a:ibm:websphere_application_server");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Web Servers");
script_copyright(english:"This script is Copyright (C) 2009-2018 Tenable Network Security, Inc.");
script_dependencies("websphere_detect.nasl");
script_require_ports("Services/www", 8880, 8881);
script_require_keys("www/WebSphere");
exit(0);
}
include("global_settings.inc");
include("misc_func.inc");
include("http.inc");
port = get_http_port(default:8880);
version = get_kb_item("www/WebSphere/"+port+"/version");
if (isnull(version)) exit(1, "Failed to extract the version from the IBM WebSphere Application Server instance listening on port " + port + ".");
if (version =~ "^[0-9]+(\.[0-9]+)?$")
exit(1, "Failed to extract a granular version from the IBM WebSphere Application Server instance listening on port " + port + ".");
ver = split(version, sep:'.', keep:FALSE);
for (i=0; i<max_index(ver); i++)
ver[i] = int(ver[i]);
if (ver[0] == 7 && ver[1] == 0 && ver[2] == 0 && ver[3] < 7)
{
if (report_verbosity > 0)
{
source = get_kb_item_or_exit("www/WebSphere/"+port+"/source");
report =
'\n Source : ' + source +
'\n Installed version : ' + version +
'\n Fixed version : 7.0.0.7' +
'\n';
security_warning(port:port, extra:report);
}
else security_warning(port);
exit(0);
}
else exit(0, "The WebSphere Application Server "+version+" instance listening on port "+port+" is not affected.");