There is a potential remote code execution vulnerability in WebSphere Application Server (CVE-2018-1904)
CVEID: CVE-2018-1904 DESCRIPTION: IBM WebSphere Application Server could allow remote attackers to execute arbitrary Java code through an administrative client class with a serialized object from untrusted sources.
CVSS Base Score: 8.1
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/152533> for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)
This vulnerability affects the following versions and releases of IBM WebSphere Application Server:
The recommended solution is to apply the interim fix, Fix Pack or PTF containing the APAR for each named product as soon as practical.
For WebSphere Application Server traditional and WebSphere Application Server Hypervisor Edition:
For V9.0.0.0 through 9.0.0.9:
ยท Upgrade to minimal fix pack levels as required by interim fix and then apply Interim Fix PH04060
--ORโ
ยท Apply Fix Pack 9.0.0.10 or later.
For V8.5.0.0 through 8.5.5.14:
ยท Upgrade to minimal fix pack levels as required by interim fix and then apply Interim Fix PH04060
--ORโ
ยท Apply Fix Pack 8.5.5.15 or later.
For V8.0.0.0 through 8.0.0.15:
ยท Upgrade to 8.0.0.15 and then apply Interim Fix PH04060
For V7.0.0.0 through 7.0.0.45:
ยท Upgrade to 7.0.0.45 and then apply Interim Fix PH04060
_WebSphere Application Server V7 and V8 are no longer in full support; IBM recommends upgrading to a fixed, supported version/release/platform of the product. _