9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
There is a potential security vulnerability with the WebSphere Application Server MQ JCA Resource adapter.
CVEID: CVE-2016-0360**
DESCRIPTION:** IBM Websphere MQ JMS 7.0.1, 7.1, 7.5, 8.0, and 9.0 client provides classes that deserialize objects from untrusted sources which could allow a malicious user to execute arbitrary Java code by adding vulnerable classes to the classpath.
CVSS Base Score: 8.1
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/111930 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)
This vulnerability affects the following versions and releases of IBM WebSphere Application Server traditional:
The recommended solution is to apply the interim fix, Fix Pack or PTF containing the APAR for each named product as soon as practical. After applying the Interim Fix or moving up to the fix pack level with fix, follow the ClassName allowlisting instructions in the Reference section**.**** **
For WebSphere Application Server traditional and WebSphere Application Server Hypervisor edition:
**
For V9.0.0.0 through 9.0.0.2:**
ยท Upgrade to Fix Pack 9.0.0.1 or later and then apply Interim Fix PI74874 and then follow instructions in reference section to apply ClassName serialization allowlisting.
--ORโ
ยท Apply Fix Pack 9.0.0.3 or later and then follow instructions in reference section to apply ClassName serialization allowlisting.
**
For V8.5.0.0 through 8.5.5.11:**
ยท Upgrade to Fix Pack Level 8.5.5.9 or later and then apply Interim Fix PI74862 and then follow instructions in reference section to apply ClassName serialization allowlisting.
--ORโ
ยท Apply Fix Pack 8.5.5.12 or later and then follow instructions in reference section to apply ClassName serialization allowlisting.
**
For V8.0.0.0 through 8.0.0.13:**
ยท Upgrade to Fix Pack 8.0.0.12 or later and then apply Interim Fix PI74468 and then follow instructions in reference section to apply ClassName serialization allowlisting.
--ORโ
ยท Apply Fix Pack 8.0.0.14 or later and then follow instructions in reference section to apply ClassName serialization allowlisting.
**
For V7.0.0.0 through 7.0.0.41:**
ยท Upgrade to Fix Pack 7.0.0.41 and then apply Interim Fix PI74468 and then follow instructions in reference section to apply ClassName serialization allowlisting.
--ORโ
ยท Apply Fix Pack 7.0.0.43 or later and then follow instructions in reference section to apply ClassName serialization allowlisting.
IBM WebSphere MQ supports Object Messages as part of the JMS specification, however ObjectMessage usage is discouraged. To mitigate this vulnerability, message types that do not contain this security flaw, such as JSON or XML, should be used. To ensure that messages come from recognized senders, a security mechanism, such as MQโs AMS (Advanced Message Security), can be used.
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P