5.3 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
LOW
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
IBM Sterling B2B Integrator and IBM Sterling File Gateway use Jetty version 6.1.8. and thus are affected by the following security vulnerabilities discovered in the Jetty version 6.1.8
CVEID:CVE-2011-4461
DESCRIPTION: Mort Bay Jetty 6.1.8 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters.
CVSS Base Score: 5
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/72017> for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P)
CVEID:CVE-2009-4612
DESCRIPTION: Multiple cross-site scripting (XSS) vulnerabilities in the WebApp JSP Snoop page in Mort Bay Jetty 6.1.8 allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO to the default URI under (1) jspsnoop/, (2) jspsnoop/ERROR/, and (3) jspsnoop/IOException/, and possibly the PATH_INFO to (4) snoop.jsp.
CVSS Base Score: 4.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/55652 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N)
CVEID:CVE-2009-4611
DESCRIPTION: Mort Bay Jetty 6.1.8 writes backtrace data without sanitizing non-printable characters, which might allow remote attackers to modify a windowβs title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator, related to (1) a string value in the Age parameter to the default URI for the Cookie Dump Servlet in test-jetty-webapp/src/main/java/com/acme/CookieDump.java under cookie/, (2) an alphabetic value in the A parameter to jsp/expr.jsp, or (3) an alphabetic value in the Content-Length HTTP header to an arbitrary application.
CVSS Base Score: 5.1
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/55533> for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:H/Au:N/C:P/I:P/A:P)
CVEID:CVE-2009-4610
DESCRIPTION: Multiple cross-site scripting (XSS) vulnerabilities in Mort Bay Jetty 6.1.8 allows remote attackers to inject arbitrary web script or HTML via (1) the query string to jsp/dump.jsp in the JSP Dump feature, or the (2) Name or (3) Value parameter to the default URI for the Session Dump Servlet under session/.
CVSS Base Score: 4.3
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/55651> for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N)
CVEID:CVE-2009-4609
DESCRIPTION:The Dump Servlet in Mort Bay Jetty 6.1.8 allows remote attackers to obtain sensitive information about internal variables and other data via a request to a URI ending in /dump/, as demonstrated by discovering the value of the getPathTranslated variable.
CVSS Base Score: 5.0
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/55650> for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:N/C:P/N:P/A:N)
CVEID:CVE-2009-1524
DESCRIPTION: Cross-site scripting (XSS) vulnerability in Mort Bay Jetty in 6.1.8 allows remote attackers to inject arbitrary web script or HTML via a directory listing request containing a ; (semicolon) character.
CVSS Base Score: 4.3
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/50301> for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:N/N:P/A:N)
CVEID:CVE-2009-1523
DESCRIPTION: Directory traversal vulnerability in the HTTP server in Mort Bay Jetty 6.1.8 allows remote attackers to access arbitrary files via directory traversal sequences in the URI.
CVSS Base Score: 4.3
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/50298> for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:P/N:N/A:N)
IBM Sterling B2B Integrator 5.1 or IBM Sterling File Gateway 2.1
IBM Sterling B2B Integrator 5.2 or IBM Sterling File Gateway 2.2
Product
| VRMF| APAR| Remediation/First Fix
β|β|β|β
_IBM Sterling B2B Integrator _| 5.1.x|
IC9918
| Jetty has been upgraded to version 6.1.26. Apply Generic Interim Fix 5104_3. Available on IWM
IBM Sterling File Gateway| 2.1.x| Jetty has been upgraded to version 6.1.26. Apply Generic Interim Fix 5104_3. Available on IWM
IBM Sterling B2B Integrator| 5.2.4.2| Jetty has been upgraded to version 6.1.26. Apply Generic Interim Fix 5020402_2. Available on Fix Central
IBM Sterling File Gateway
_ _
| 2.2.4.2| Jetty has been upgraded to version 6.1.26. Apply Generic Interim Fix 5020402_2. Available on Fix Central
IBM Sterling B2B Integrator| 5.2.x| Jetty has been upgraded to version 6.1.26. Apply 5020500 Fix Pack or Media available on Fix Central and Passport Advantage respectively
IBM Sterling File Gateway
_ _
| 2.2.x| Jetty has been upgraded to version 6.1.26. Apply 5020500 Fix Pack or Media available on Fix Central and Passport Advantage respectively
To acquire the fix please login to IWM
See FAQs on downloading an iFix from the IWM site_
_
To acquire the fix please login to IBM Fix Central.
More details and release notes can be found here:
IBM Sterling B2B Integrator 5.2 Information Center
To acquire the fix from Passport Advantage, please login here.
None Known.
CPE | Name | Operator | Version |
---|---|---|---|
ibm sterling b2b integrator | eq | 5.2 | |
ibm sterling b2b integrator | eq | 5.1 |
5.3 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
LOW
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P