Lucene search

K
nessusThis script is Copyright (C) 2010-2018 Tenable Network Security, Inc.WEBSPHERE_6_1_0_33.NASL
HistorySep 28, 2010 - 12:00 a.m.

IBM WebSphere Application Server 6.1 < 6.1.0.33 Multiple Vulnerabilities

2010-09-2800:00:00
This script is Copyright (C) 2010-2018 Tenable Network Security, Inc.
www.tenable.com
29

IBM WebSphere Application Server 6.1 before Fix Pack 33 appears to be running on the remote host. As such, it is reportedly affected by multiple vulnerabilities :

  • An unspecified cross-site scripting vulnerability exists in the Administration Console. (PM09250, PM11778)

  • An unspecified error exists when a Java API for XML Web Services (JAX-WS) application with the WS-Security policy specifies a Time Stamp value. (PM16014 / PM08360)

  • Sensitive information is stored by ‘ceiDbPasswordDefaulter’ in the '<WAS_HOME>/logs/managedprofiles/*_create.log file.
    (PM12065)

  • When security tracing is enabled, it is possible for a NullPointerException to be thrown when calling a logout on a LoginContext. (PM02636)


# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(49691);
  script_version("1.8");
  script_cvs_date("Date: 2018/08/06 14:03:16");

  script_cve_id(
    "CVE-2010-0778",
    "CVE-2010-0779",
    "CVE-2010-0781",
    "CVE-2010-3186"
  );
  script_bugtraq_id(41148, 41149, 42801, 43425);
  script_xref(name:"Secunia", value:"41173");

  script_name(english:"IBM WebSphere Application Server 6.1 < 6.1.0.33 Multiple Vulnerabilities");
  script_summary(english:"Reads the version number from the SOAP port");

  script_set_attribute(attribute:"synopsis", value:
"The remote application server is affected by multiple vulnerabilities.");
  script_set_attribute(attribute:"description", value:
"IBM WebSphere Application Server 6.1 before Fix Pack 33 appears to be
running on the remote host.  As such, it is reportedly affected by
multiple vulnerabilities :

  - An unspecified cross-site scripting vulnerability
    exists in the Administration Console. (PM09250,
    PM11778)

  - An unspecified error exists when a Java API for XML Web
    Services (JAX-WS) application with the WS-Security policy
    specifies a Time Stamp value. (PM16014 / PM08360)

  - Sensitive information is stored by
    'ceiDbPasswordDefaulter' in the
    '<WAS_HOME>/logs/managedprofiles/*_create.log file.
    (PM12065)

  - When security tracing is enabled, it is possible for a
    NullPointerException to be thrown when calling a
    logout on a LoginContext. (PM02636)");

  script_set_attribute(attribute:"see_also",value:"http://www-01.ibm.com/support/docview.wss?uid=swg21404665");
  script_set_attribute(attribute:"see_also",value:"http://www-01.ibm.com/support/docview.wss?uid=swg27009778");
  script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?uid=swg1PM02636");
  script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?uid=swg21443736");
  script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?uid=swg1PM12065");
  script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?uid=swg27007951#61033");
  script_set_attribute(attribute:"solution", value:
"If using WebSphere Application Server, apply Fix Pack 33 (6.1.0.33) or
later. 

Otherwise, if using embedded WebSphere Application Server packaged with
Tivoli Directory Server, apply the latest recommended eWAS fix pack.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"vuln_publication_date", value:"2010/09/13");
  script_set_attribute(attribute:"patch_publication_date", value:"2010/09/13");
  script_set_attribute(attribute:"plugin_publication_date", value:"2010/09/28");

  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:ibm:websphere_application_server");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Web Servers");

  script_copyright(english:"This script is Copyright (C) 2010-2018 Tenable Network Security, Inc.");

  script_dependencies("websphere_detect.nasl");
  script_require_ports("Services/www", 8880, 8881);
  script_require_keys("www/WebSphere");

  exit(0);
}


include("global_settings.inc");
include("misc_func.inc");
include("http.inc");

port = get_http_port(default:8880, embedded: 0);


version = get_kb_item("www/WebSphere/"+port+"/version");
if (isnull(version)) exit(1, "Failed to extract the version from the IBM WebSphere Application Server instance listening on port " + port + ".");
if (version =~ "^[0-9]+(\.[0-9]+)?$")
  exit(1, "Failed to extract a granular version from the IBM WebSphere Application Server instance listening on port " + port + ".");

ver = split(version, sep:'.', keep:FALSE);
for (i=0; i<max_index(ver); i++)
  ver[i] = int(ver[i]);

if (ver[0] == 6 && ver[1] == 1 && ver[2] == 0 && ver[3] < 33)
{
  if (report_verbosity > 0)
  {
    source = get_kb_item_or_exit("www/WebSphere/"+port+"/source");

    report =
      '\n  Source            : ' + source +
      '\n  Installed version : ' + version +
      '\n  Fixed version     : 6.1.0.33' +
      '\n';
    security_hole(port:port, extra:report);
  }
  else security_hole(port);
  exit(0);
}
else exit(0, "The WebSphere Application Server "+version+" instance listening on port "+port+" is not affected.");
VendorProductVersionCPE
ibmwebsphere_application_servercpe:/a:ibm:websphere_application_server
Related for WEBSPHERE_6_1_0_33.NASL