ID CVE-2016-0360 Type cve Reporter cve@mitre.org Modified 2017-07-27T01:29:00
Description
IBM Websphere MQ JMS 7.0.1, 7.1, 7.5, 8.0, and 9.0 client provides classes that deserialize objects from untrusted sources which could allow a malicious user to execute arbitrary Java code by adding vulnerable classes to the classpath. IBM Reference #: 1983457.
{"nessus": [{"lastseen": "2021-02-01T07:39:48", "description": "According to its self-reported version, the IBM WebSphere MQ server\ninstalled on the remote Windows host is version 7.0.1.x without patch\nAPAR IT14385, 7.1.0.x prior to 7.1.0.9, 7.5.0.x prior to 7.5.0.8,\n8.0.0.x prior to 8.0.0.6, or 9.0.0.x prior to 9.0.0.1. It is,\ntherefore, affected by multiple vulnerabilities :\n\n - A flaw exists in the Java Message Service (JMS) in the\n JMSObjectMessage class due to improper sanitization of\n input when deserializing Java objects. An authenticated,\n remote attacker can exploit this to execute arbitrary\n code. (CVE-2016-0360)\n\n - A flaw exists due to improper data conversion handling\n that allows an authenticated, remote attacker to crash\n the MQ channel. (CVE-2016-3013)\n\n - A flaw exists that under nonstandard configurations\n causes password data to be sent in cleartext over the\n network. A man-in-the-middle attacker can exploit this\n to disclose passwords. (CVE-2016-3052)\n\n - An unspecified flaw exists that allows an authenticated,\n remote attacker, who has access to the queue manager and\n queue, to cause a denial of service to other channels\n running under the same process. (CVE-2016-8915)\n\n - A flaw exists that allows an unauthenticated, remote\n attacker to have an unspecified impact. No other details\n are available. (CVE-2016-8971)\n\n - An unspecified flaw exists that allows an authenticated,\n remote attacker, who has access to the queue manager,\n to disrupt MQ channels using specially crafted HTTP\n requests, resulting in a denial of service condition.\n (CVE-2016-8986)\n\n - An unspecified flaw exists that allows an authenticated,\n remote attacker, who has authority to create cluster\n objects, to cause a denial of service condition in\n MQ clustering. (CVE-2016-9009)", "edition": 30, "cvss3": {"score": 9.8, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2017-03-03T00:00:00", "title": "IBM WebSphere MQ 7.0.1.x / 7.1.0.x < 7.1.0.9 / 7.5.0.x < 7.5.0.8 / 8.0.0.x < 8.0.0.6 / 9.0.0.x < 9.0.0.1 Multiple Vulnerabilities", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-8986", "CVE-2016-3052", "CVE-2016-9009", "CVE-2016-0360", "CVE-2016-8915", "CVE-2016-8971", "CVE-2016-3013"], "modified": "2021-02-02T00:00:00", "cpe": ["cpe:/a:ibm:websphere_mq"], "id": "WEBSPHERE_MQ_SWG21983457.NASL", "href": "https://www.tenable.com/plugins/nessus/96663", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\nif (!defined_func(\"nasl_level\") || nasl_level() < 6000 ) exit(0);\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(96663);\n script_version(\"1.7\");\n script_cvs_date(\"Date: 2019/11/13\");\n\n script_cve_id(\n \"CVE-2016-0360\",\n \"CVE-2016-3013\",\n \"CVE-2016-3052\",\n \"CVE-2016-8915\",\n \"CVE-2016-8971\",\n \"CVE-2016-8986\",\n \"CVE-2016-9009\"\n );\n script_bugtraq_id(\n 95317,\n 96394,\n 96400,\n 96403,\n 96412,\n 96441\n );\n\n script_name(english:\"IBM WebSphere MQ 7.0.1.x / 7.1.0.x < 7.1.0.9 / 7.5.0.x < 7.5.0.8 / 8.0.0.x < 8.0.0.6 / 9.0.0.x < 9.0.0.1 Multiple Vulnerabilities\");\n script_summary(english:\"Checks the version of IBM WebSphere MQ.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"A message queuing service installed on the remote host is affected by\nmultiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to its self-reported version, the IBM WebSphere MQ server\ninstalled on the remote Windows host is version 7.0.1.x without patch\nAPAR IT14385, 7.1.0.x prior to 7.1.0.9, 7.5.0.x prior to 7.5.0.8,\n8.0.0.x prior to 8.0.0.6, or 9.0.0.x prior to 9.0.0.1. It is,\ntherefore, affected by multiple vulnerabilities :\n\n - A flaw exists in the Java Message Service (JMS) in the\n JMSObjectMessage class due to improper sanitization of\n input when deserializing Java objects. An authenticated,\n remote attacker can exploit this to execute arbitrary\n code. (CVE-2016-0360)\n\n - A flaw exists due to improper data conversion handling\n that allows an authenticated, remote attacker to crash\n the MQ channel. (CVE-2016-3013)\n\n - A flaw exists that under nonstandard configurations\n causes password data to be sent in cleartext over the\n network. A man-in-the-middle attacker can exploit this\n to disclose passwords. (CVE-2016-3052)\n\n - An unspecified flaw exists that allows an authenticated,\n remote attacker, who has access to the queue manager and\n queue, to cause a denial of service to other channels\n running under the same process. (CVE-2016-8915)\n\n - A flaw exists that allows an unauthenticated, remote\n attacker to have an unspecified impact. No other details\n are available. (CVE-2016-8971)\n\n - An unspecified flaw exists that allows an authenticated,\n remote attacker, who has access to the queue manager,\n to disrupt MQ channels using specially crafted HTTP\n requests, resulting in a denial of service condition.\n (CVE-2016-8986)\n\n - An unspecified flaw exists that allows an authenticated,\n remote attacker, who has authority to create cluster\n objects, to cause a denial of service condition in\n MQ clustering. (CVE-2016-9009)\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www-01.ibm.com/support/docview.wss?uid=swg21983457\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www-01.ibm.com/support/docview.wss?uid=swg1SE66318\");\n script_set_attribute(attribute:\"solution\", value:\n\"Apply the appropriate fix pack, APAR patch, or mitigation :\n\n - For versions 7.0.1.x, apply the patch APAR IT14385 and\n follow the instructions in the patch readme to apply\n serialization whitelisting.\n\n - For versions 7.1.0.x, apply fix pack 9 (7.1.0.9) when\n available. In the interim, apply the patch APAR IT14385\n and follow the instructions in the patch readme to apply\n serialization whitelisting.\n\n - For versions 7.5.0.x, apply fix pack 8 (7.5.0.8) when\n available. In the interim, apply the patch APAR IT14385\n and follow the instructions in the patch readme to apply\n serialization whitelisting.\n\n - For versions 8.0.0.x, apply fix pack 6 (8.0.0.6) when\n available. In the interim, use JSON or XML rather than\n ObjectMessage and enable MQ's Advanced Message Security\n (AMS) mechanism.\n\n - For versions 9.0.0.x, apply fix pack 1 (9.0.0.1) when\n available. In the interim, apply the patch APAR IT14385\n and follow the instructions in the patch readme to apply\n serialization whitelisting.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2016-0360\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2017/01/06\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2017/01/06\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2017/03/03\");\n\n script_set_attribute(attribute:\"potential_vulnerability\", value:\"true\");\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:ibm:websphere_mq\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"websphere_mq_installed.nasl\");\n script_require_keys(\"installed_sw/IBM WebSphere MQ\", \"Settings/ParanoidReport\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"install_func.inc\");\ninclude(\"smb_func.inc\");\ninclude(\"smb_hotfixes.inc\");\ninclude(\"smb_hotfixes_fcheck.inc\");\ninclude(\"bsal.inc\");\ninclude(\"byte_func.inc\");\ninclude(\"zip.inc\");\n\napp_name = \"IBM WebSphere MQ\";\ninstall = get_single_install(app_name:app_name, exit_if_unknown_ver:TRUE);\nif (report_paranoia < 2) audit(AUDIT_PARANOID);\nversion = install['version'];\npath = install['path'];\ntype = install['Type'];\nfix = FALSE;\nflag = FALSE;\n\nswitch[=~] (version)\n{\n case \"^7\\.0\\.1\\.\":\n contents = hotfix_get_file_contents(path + \"\\java\\lib\\com.ibm.mqjms.jar\");\n prop = zip_parse(blob:contents['data'], 'com/ibm/msg/client/commonservices/resources/JMSCS_MessageResourceBundle.properties');\n if (\"IT14385\" >!< prop)\n {\n fix = \"7.0.1.14 & IT14385\";\n flag = TRUE;\n }\n break;\n case \"^7\\.1\\.0\\.\":\n fix = \"7.1.0.9\";\n break;\n case \"^7\\.5\\.0\\.\":\n fix = \"7.5.0.8\";\n break;\n case \"^8\\.0\\.0\\.\":\n fix = \"8.0.0.6\";\n break;\n case \"^9\\.0\\.0\\.\":\n fix = \"9.0.0.1\";\n break;\n default:\n audit(AUDIT_INST_PATH_NOT_VULN, app_name, version, path);\n}\n\n\n# Check affected version\nif(flag || ver_compare(ver:version, fix:fix, strict:FALSE) == -1)\n{\n port = get_kb_item(\"SMB/transport\");\n if (!port) port = 445;\n report =\n '\\n Path : ' + path +\n '\\n Installed version : ' + version +\n '\\n Fixed version : ' + fix +\n '\\n';\n security_report_v4(port:port, extra:report, severity:SECURITY_HOLE);\n}\nelse audit(AUDIT_INST_PATH_NOT_VULN, app_name, version, path);\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}]}