ID CVE-2009-1174
Summary The Web Services Security component in IBM WebSphere Application Server (WAS) 6.0.2 before 6.0.2.35 and 7.0 before 7.0.0.3 has an unspecified "security problem" in the XML digital-signature specification, which has unknown impact and attack vectors.
References
Vulnerable Configurations
  • IBM WebSphere Application Server 7.0
    cpe:2.3:a:ibm:websphere_application_server:7.0
  • IBM WebSphere Application Server 7.0.0.1
    cpe:2.3:a:ibm:websphere_application_server:7.0.0.1
CVSS
Base: 10.0 (as of 07-09-2016 - 11:18)
Impact:
Exploitability:
CWE CWE-310
CAPEC
  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
nessus via4
  • NASL family Web Servers
    NASL id WEBSPHERE_6_1_0_25.NASL
    description IBM WebSphere Application Server 6.1 before Fix Pack 25 appears to be running on the remote host. As such, it is reportedly affected by multiple vulnerabilities : - Non-standard HTTP methods are allowed. (PK73246) - An error in Single Sign-on (SSO) with SPNEGO implementation could allow a remote attacker to bypass security restrictions. (PK77465) - 'wsadmin' is affected by a security exposure. (PK77495) - Security flag 'isSecurityEnabled' is incorrectly set after migrating from VMM. (PK78134) - In certain cases sensitive information may appear in migration trace. (PK78134) - Use of insecure password obfuscation algorithm by Web services could result in weaker than expected security provided the client module specifies a password in ibm-webservicesclient-bind.xmi and target environment has custom password encryption enabled. (PK79275) - Sensitive information might appear in trace files. (PK80337) - XML digital signature is affected by a security issue. (PK80596) - If CSIv2 Security is configured with Identity Assertion, it may be possible for a remote attacker to bypass security restrictions. (PK83097) - IBM Stax XMLStreamWriter may write to an incorrect XML file, and hence is susceptible to a XML fuzzing attack. (PK84015) - Configservice APIs could display sensitive information. (PK84999) - A security bypass caused by inbound requests that lack a SOAPAction or WS-Addressing Action. (PK72138)
    last seen 2019-02-21
    modified 2018-08-06
    plugin id 39450
    published 2009-06-19
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=39450
    title IBM WebSphere Application Server < 6.1.0.25 Multiple Vulnerabilities
  • NASL family Web Servers
    NASL id WEBSPHERE_7_0_0_3.NASL
    description IBM WebSphere Application Server 7.0 before Fix Pack 3 appears to be running on the remote host. As such, it is reportedly affected by multiple vulnerabilities : - Under certain conditions it may be possible to access administrative console user sessions. (PK74966) - The administrative console is affected by a cross-site scripting vulnerability. (PK77505) - If APAR PK41002 has been applied, a vulnerability in the JAX-RPC WS-Security component could incorrectly validate 'UsernameToken'. (PK75992) - Sample applications shipped with IBM WebSphere Application Server are affected by cross-site scripting vulnerabilities. (PK76720) - Certain files associated with interim fixes for Unix- based versions of IBM WebSphere Application Server are built with insecure file permissions. (PK77590) - The Web Services Security component is affected by an unspecified security issue in digital-signature specification. (PK80596) - It may be possible for an attacker to read arbitrary application-specific war files. (PK81387) - A security bypass caused by inbound requests that lack a SOAPAction or WS-Addressing Action. (PK72138)
    last seen 2019-02-21
    modified 2018-08-06
    plugin id 36133
    published 2009-04-10
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=36133
    title IBM WebSphere Application Server 7.0 < Fix Pack 3
refmap via4
aixapar PK80596
bid 34506
confirm
secunia
  • 34131
  • 34461
  • 35301
vupen ADV-2009-1464
Last major update 07-09-2016 - 11:27
Published 31-03-2009 - 10:09
Back to Top