Lucene search

K
nessusThis script is Copyright (C) 2009-2018 Tenable Network Security, Inc.WEBSPHERE_7_0_0_5.NASL
HistoryAug 31, 2009 - 12:00 a.m.

IBM WebSphere Application Server 7.0 < Fix Pack 5

2009-08-3100:00:00
This script is Copyright (C) 2009-2018 Tenable Network Security, Inc.
www.tenable.com
19

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.014 Low

EPSS

Percentile

86.6%

IBM WebSphere Application Server 7.0 before Fix Pack 5 appears to be running on the remote host. As such, it is reportedly affected by multiple vulnerabilities :

  • Non-standard HTTP methods are allowed. (PK73246)

  • If the admin console is directly accessed from HTTP, the console fails to redirect the connection to a secure login page. (PK77010)

  • An error in Single Sign-on (SSO) with SPNEGO implementation could allow a remote attacker to bypass security restrictions. (PK77465)

  • โ€˜wsadminโ€™ is affected by a security exposure. (PK77495)

  • Security flag โ€˜isSecurityEnabledโ€™ is incorrectly set after migrating from VMM. (PK78134)

  • Use of insecure password obfuscation algorithm by Web services could result in weaker than expected security provided the client module specifies a password in ibm-webservicesclient-bind.xmi and target environment has custom password encryption enabled. (PK79275)

  • After upgrading from WebSphere Application Server V6.1 to V7.0 with tracing enabled, an attacker may be able view sensitive information by viewing the trace files.
    (PK80337)

  • If CSIv2 Security is configured with Identity Assertion, it may be possible for a remote attacker to bypass security restrictions. (PK83097)

  • New applications deployed in WebSphere Application Server for z/OS prior to 1.8 are saved on the file system with insecure privileges resulting in disclosure of sensitive information. (PK83308)

  • Configservice APIs could display sensitive information.
    (PK84999)

  • Vulnerabilities in Apache HTTP server could allow a local user to gain elevated privileges. (PK86232)

  • A error in โ€˜wsadminโ€™ could allow a remote attacker to bypass security restrictions. (PK86328)

  • A vulnerability in portlet serving enable parameter could allow an attacker to bypass security restrictions and gain unauthorized access to the application. (PK89385)

#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(40823);
  script_version("1.13");
  script_cvs_date("Date: 2018/08/06 14:03:16");

  script_cve_id(
    "CVE-2009-0899", 
    "CVE-2009-1195", 
    "CVE-2009-1898",
    "CVE-2009-1899",
    "CVE-2009-1900",
    "CVE-2009-1901",
    "CVE-2009-2085",
    "CVE-2009-2087",
    "CVE-2009-2088",
    "CVE-2009-2089", 
    "CVE-2009-0899", 
    "CVE-2009-2090",
    "CVE-2009-2091",
    "CVE-2009-2092"
  );
  script_bugtraq_id(36153, 36154, 36155, 36156, 36157, 36158, 36163);

  script_name(english:"IBM WebSphere Application Server 7.0 < Fix Pack 5");
  script_summary(english:"Reads the version number from the SOAP port");

  script_set_attribute(attribute:"synopsis", value:
"The remote application server is affected by multiple vulnerabilities.");
  script_set_attribute(attribute:"description", value:
"IBM WebSphere Application Server 7.0 before Fix Pack 5 appears to be
running on the remote host.  As such, it is reportedly affected by
multiple vulnerabilities :

  - Non-standard HTTP methods are allowed. (PK73246)

  - If the admin console is directly accessed from HTTP,
    the console fails to redirect the connection to a
    secure login page. (PK77010)

  - An error in Single Sign-on (SSO) with SPNEGO 
    implementation could allow a remote attacker
    to bypass security restrictions. (PK77465)

  - 'wsadmin' is affected by a security exposure. 
    (PK77495)  

  - Security flag 'isSecurityEnabled' is incorrectly set
    after migrating from VMM. (PK78134)

  - Use of insecure password obfuscation algorithm by Web
    services could result in weaker than expected security
    provided the client module specifies a password in 
    ibm-webservicesclient-bind.xmi and target environment 
    has custom password encryption enabled. (PK79275)

  - After upgrading from WebSphere Application Server V6.1 
    to V7.0 with tracing enabled, an attacker may be able
    view sensitive information by viewing the trace files.
    (PK80337)  

  - If CSIv2 Security is configured with Identity 
    Assertion, it may be possible for a remote
    attacker to bypass security restrictions. (PK83097)

  - New applications deployed in WebSphere Application 
    Server for z/OS prior to 1.8 are saved on the file
    system with insecure privileges resulting in
    disclosure of sensitive information. (PK83308)

  - Configservice APIs could display sensitive information.
    (PK84999)

  - Vulnerabilities in Apache HTTP server could allow a
    local user to gain elevated privileges. (PK86232)

  - A error in 'wsadmin' could allow a remote attacker
    to bypass security restrictions. (PK86328)
   
  - A vulnerability in portlet serving enable parameter
    could allow an attacker to bypass security restrictions
    and gain unauthorized access to the application. 
    (PK89385)");
  script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?uid=swg27014463#7005");
  script_set_attribute(attribute:"solution", value:"Apply Fix Pack 5 (7.0.0.5) or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");
  script_cwe_id(16, 200, 255, 264, 287);

  script_set_attribute(attribute:"vuln_publication_date", value:"2009/07/27");
  script_set_attribute(attribute:"patch_publication_date", value:"2009/07/27");
  script_set_attribute(attribute:"plugin_publication_date", value:"2009/08/31");
 
  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:ibm:websphere_application_server");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Web Servers");

  script_copyright(english:"This script is Copyright (C) 2009-2018 Tenable Network Security, Inc.");

  script_dependencies("websphere_detect.nasl");
  script_require_ports("Services/www", 8880, 8881);
  script_require_keys("www/WebSphere");

  exit(0);
}

include("global_settings.inc");
include("misc_func.inc");
include("http.inc");

port = get_http_port(default:8880);


version = get_kb_item("www/WebSphere/"+port+"/version");
if (isnull(version)) exit(1, "Failed to extract the version from the IBM WebSphere Application Server instance listening on port " + port + ".");
if (version =~ "^[0-9]+(\.[0-9]+)?$")
  exit(1, "Failed to extract a granular version from the IBM WebSphere Application Server instance listening on port " + port + ".");

ver = split(version, sep:'.', keep:FALSE);
for (i=0; i<max_index(ver); i++)
  ver[i] = int(ver[i]);

if (ver[0] == 7 && ver[1] == 0 && ver[2] == 0 && ver[3] < 5)
{
  if (report_verbosity > 0)
  {
    source = get_kb_item_or_exit("www/WebSphere/"+port+"/source");

    report = 
      '\n  Source            : ' + source + 
      '\n  Installed version : ' + version +
      '\n  Fixed version     : 7.0.0.5' +
      '\n';
    security_warning(port:port, extra:report);
  }
  else security_warning(port);
  exit(0);
}
else exit(0, "The WebSphere Application Server "+version+" instance listening on port "+port+" is not affected.");
VendorProductVersionCPE
ibmwebsphere_application_servercpe:/a:ibm:websphere_application_server

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.014 Low

EPSS

Percentile

86.6%