Lucene search

K
nessusThis script is Copyright (C) 2013-2022 and is owned by Tenable, Inc. or an Affiliate thereof.WEBSPHERE_8_5_0_2.NASL
HistoryMay 10, 2013 - 12:00 a.m.

IBM WebSphere Application Server 8.5 < Fix Pack 2 Multiple Vulnerabilities

2013-05-1000:00:00
This script is Copyright (C) 2013-2022 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
171

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.067 Low

EPSS

Percentile

93.8%

IBM WebSphere Application Server 8.5 before Fix Pack 2 appears to be running on the remote host and is, therefore, potentially affected by the following vulnerabilities :

  • The included Java SDK contains several errors that affect the application directly. (CVE-2013-0169, CVE-2013-0440, CVE-2013-0443)

  • Input validation errors exist related to the administration console that could allow cross-site scripting attacks. (CVE-2013-0458 / PM71139, CVE-2013-0461 / PM71389, CVE-2013-0542 / PM81846, CVE-2013-0565 / PM83402)

  • An input validation error exists related to the administration console that could allow cross-site scripting attacks. Note that this issue affects only the application when running on z/OS operating systems.
    (CVE-2013-0459 / PM72536)

  • An unspecified error could allow security bypass for authenticated users. (CVE-2013-0462 / PM76886 or PM79937)

  • An error exists related to ‘WS-Security’ and SOAP message handling that could allow an attacker to spoof message signatures. (CVE-2013-0482 / PM76582)

  • An error exists related to authentication cookies that could allow remote attackers to gain access to restricted resources. Note this only affects the application when running the ‘Liberty Profile’.
    (CVE-2013-0540 / PM81056)

  • A buffer overflow error exists related to ‘WebSphere Identity Manger (WIM)’ that could allow denial of service attacks. (CVE-2013-0541 / PM74909)

  • An unspecified error could allow security bypass, thus allowing remote attackers access to restricted resources on HP, Linux and Solaris hosts.
    (CVE-2013-0543 / PM75582)

  • An unspecified error related to the administration console could allow directory traversal attacks on Unix and Linux hosts. (CVE-2013-0544 / PM82468)

#
# (C) Tenable Network Security, Inc.
#

include('compat.inc');

if (description)
{
  script_id(66375);
  script_version("1.11");
  script_set_attribute(attribute:"plugin_modification_date", value:"2022/12/05");

  script_cve_id(
    "CVE-2013-0169",
    "CVE-2013-0440",
    "CVE-2013-0443",
    "CVE-2013-0458",
    "CVE-2013-0459",
    "CVE-2013-0461",
    "CVE-2013-0462",
    "CVE-2013-0482",
    "CVE-2013-0540",
    "CVE-2013-0541",
    "CVE-2013-0542",
    "CVE-2013-0543",
    "CVE-2013-0544",
    "CVE-2013-0565"
  );
  script_bugtraq_id(
    57508,
    57509,
    57512,
    57513,
    57702,
    57712,
    57778,
    59246,
    59247,
    59248,
    59250,
    59251,
    59252,
    59650
  );
  script_xref(name:"CEA-ID", value:"CEA-2019-0547");

  script_name(english:"IBM WebSphere Application Server 8.5 < Fix Pack 2 Multiple Vulnerabilities");

  script_set_attribute(attribute:"synopsis", value:
"The remote application server may be affected by multiple
vulnerabilities.");
  script_set_attribute(attribute:"description", value:
"IBM WebSphere Application Server 8.5 before Fix Pack 2 appears to be
running on the remote host and is, therefore, potentially affected by
the following vulnerabilities :

  - The included Java SDK contains several errors that
    affect the application directly. (CVE-2013-0169,
    CVE-2013-0440, CVE-2013-0443)

  - Input validation errors exist related to the
    administration console that could allow cross-site
    scripting attacks. (CVE-2013-0458 / PM71139,
    CVE-2013-0461 / PM71389, CVE-2013-0542 / PM81846,
    CVE-2013-0565 / PM83402)

  - An input validation error exists related to the
    administration console that could allow cross-site
    scripting attacks. Note that this issue affects only
    the application when running on z/OS operating systems.
    (CVE-2013-0459 / PM72536)

  - An unspecified error could allow security bypass for
    authenticated users. (CVE-2013-0462 / PM76886 or
    PM79937)

  - An error exists related to 'WS-Security' and SOAP
    message handling that could allow an attacker to spoof
    message signatures. (CVE-2013-0482 / PM76582)

  - An error exists related to authentication cookies that
    could allow remote attackers to gain access to
    restricted resources. Note this only affects the
    application when running the 'Liberty Profile'.
    (CVE-2013-0540 / PM81056)

  - A buffer overflow error exists related to 'WebSphere
    Identity Manger (WIM)' that could allow denial of
    service attacks. (CVE-2013-0541 / PM74909)

  - An unspecified error could allow security bypass, thus
    allowing remote attackers access to restricted resources
    on HP, Linux and Solaris hosts.
    (CVE-2013-0543 / PM75582)

  - An unspecified error related to the administration
    console could allow directory traversal attacks on
    Unix and Linux hosts. (CVE-2013-0544 / PM82468)");
  script_set_attribute(attribute:"see_also", value:"https://www-304.ibm.com/support/docview.wss?&uid=swg21632423");
  script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?uid=swg21627634");
  # https://www-304.ibm.com/connections/blogs/PSIRT/entry/security_bulletin_security_vulnerabilites_fixed_in_ibm_websphere_application_server_8_5_0_2?lang=en_us
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?889b42fc");
  script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?uid=swg24034672");
  script_set_attribute(attribute:"solution", value:
"Apply Fix Pack 2 for version 8.5 (8.5.0.2) or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2013-0462");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");
  script_cwe_id(20, 74, 79, 442, 629, 711, 712, 722, 725, 750, 751, 800, 801, 809, 811, 864, 900, 928, 931, 990);

  script_set_attribute(attribute:"vuln_publication_date", value:"2013/01/21");
  script_set_attribute(attribute:"patch_publication_date", value:"2013/04/15");
  script_set_attribute(attribute:"plugin_publication_date", value:"2013/05/10");

  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:ibm:websphere_application_server");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Web Servers");

  script_copyright(english:"This script is Copyright (C) 2013-2022 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("websphere_detect.nasl");
  script_require_keys("www/WebSphere");
  script_require_ports("Services/www", 8880, 8881);

  exit(0);
}


include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
include("http.inc");


port = get_http_port(default:8880, embedded:0);

version = get_kb_item_or_exit("www/WebSphere/"+port+"/version");
source = get_kb_item_or_exit("www/WebSphere/"+port+"/source");

if (version !~ "^8\.5([^0-9]|$)") exit(0, "The version of the IBM WebSphere Application Server instance listening on port "+port+" is "+version+", not 8.5.");

if (version =~ "^[0-9]+(\.[0-9]+)?$")
  exit(1, "Failed to extract a granular version from the IBM WebSphere Application Server instance listening on port " + port + ".");

ver = split(version, sep:'.', keep:FALSE);
for (i=0; i<max_index(ver); i++)
  ver[i] = int(ver[i]);

if (ver[0] == 8 && ver[1] == 5 && ver[2] == 0 && ver[3] < 2)
{
  set_kb_item(name:'www/'+port+'/XSS', value:TRUE);

  if (report_verbosity > 0)
  {
    report =
      '\n  Version source    : ' + source +
      '\n  Installed version : ' + version +
      '\n  Fixed version     : 8.5.0.2' +
      '\n';
    security_hole(port:port, extra:report);
  }
  else security_hole(port);
  exit(0);
}
else audit(AUDIT_LISTEN_NOT_VULN, "WebSphere", port, version);
VendorProductVersionCPE
ibmwebsphere_application_servercpe:/a:ibm:websphere_application_server

References

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.067 Low

EPSS

Percentile

93.8%