ID CVE-2009-2087
Summary The Web Services functionality in IBM WebSphere Application Server (WAS) 6.1 before 6.1.0.25 and 7.0 before 7.0.0.5, in certain circumstances involving the ibm-webservicesclient-bind.xmi file and custom password encryption, uses weak password obfuscation, which allows local users to cause a denial of service (deployment failure) via unspecified vectors.
References
Vulnerable Configurations
  • IBM WebSphere Application Server 6.1.0.19 (Fix Pack 19)
    cpe:2.3:a:ibm:websphere_application_server:6.1.0.19
  • cpe:2.3:a:ibm:websphere_application_server:6.1.0.8
    cpe:2.3:a:ibm:websphere_application_server:6.1.0.8
  • cpe:2.3:a:ibm:websphere_application_server:6.1.0.6
    cpe:2.3:a:ibm:websphere_application_server:6.1.0.6
  • cpe:2.3:a:ibm:websphere_application_server:6.1.0.4
    cpe:2.3:a:ibm:websphere_application_server:6.1.0.4
  • IBM WebSphere Application Server 6.1.0.21 (Fix Pack 21)
    cpe:2.3:a:ibm:websphere_application_server:6.1.0.21
  • cpe:2.3:a:ibm:websphere_application_server:6.1.0.20
    cpe:2.3:a:ibm:websphere_application_server:6.1.0.20
  • cpe:2.3:a:ibm:websphere_application_server:6.1.0.22
    cpe:2.3:a:ibm:websphere_application_server:6.1.0.22
  • IBM WebSphere Application Server 6.1.0.24
    cpe:2.3:a:ibm:websphere_application_server:6.1.0.24
  • IBM WebSphere Application Server 6.1.0.23 (Fix Pack 23)
    cpe:2.3:a:ibm:websphere_application_server:6.1.0.23
  • IBM WebSphere Application Server 6.1.0.1 (Fix Pack 1)
    cpe:2.3:a:ibm:websphere_application_server:6.1.0.1
  • cpe:2.3:a:ibm:websphere_application_server:6.1.0.16
    cpe:2.3:a:ibm:websphere_application_server:6.1.0.16
  • IBM WebSphere Application Server 6.1.0.2 (Fix Pack 2)
    cpe:2.3:a:ibm:websphere_application_server:6.1.0.2
  • IBM WebSphere Application Server 6.1.0.3 (Fix Pack 3)
    cpe:2.3:a:ibm:websphere_application_server:6.1.0.3
  • cpe:2.3:a:ibm:websphere_application_server:6.1.0.10
    cpe:2.3:a:ibm:websphere_application_server:6.1.0.10
  • IBM WebSphere Application Server 6.1.0.5 (Fix Pack 5)
    cpe:2.3:a:ibm:websphere_application_server:6.1.0.5
  • IBM WebSphere Application Server 6.1.0.15 (Fix Pack 15)
    cpe:2.3:a:ibm:websphere_application_server:6.1.0.15
  • IBM WebSphere Application Server 6.1.0.7 (Fix Pack 7)
    cpe:2.3:a:ibm:websphere_application_server:6.1.0.7
  • IBM WebSphere Application Server 6.1.0.13 (Fix Pack 13)
    cpe:2.3:a:ibm:websphere_application_server:6.1.0.13
  • IBM WebSphere Application Server 6.1.0.14 (Fix Pack 14)
    cpe:2.3:a:ibm:websphere_application_server:6.1.0.14
  • IBM WebSphere Application Server 6.1.0.17 (Fix Pack 17)
    cpe:2.3:a:ibm:websphere_application_server:6.1.0.17
  • IBM WebSphere Application Server 6.1.0.0
    cpe:2.3:a:ibm:websphere_application_server:6.1.0.0
  • IBM WebSphere Application Server 6.1.0
    cpe:2.3:a:ibm:websphere_application_server:6.1.0
  • IBM WebSphere Application Server 6.1.0.9 (Fix Pack 9)
    cpe:2.3:a:ibm:websphere_application_server:6.1.0.9
  • IBM WebSphere Application Server 6.1.0.11 (Fix Pack 11)
    cpe:2.3:a:ibm:websphere_application_server:6.1.0.11
  • IBM WebSphere Application Server 6.1.0.12
    cpe:2.3:a:ibm:websphere_application_server:6.1.0.12
  • IBM WebSphere Application Server 6.1
    cpe:2.3:a:ibm:websphere_application_server:6.1
  • cpe:2.3:a:ibm:websphere_application_server:6.1.0.18
    cpe:2.3:a:ibm:websphere_application_server:6.1.0.18
  • IBM WebSphere Application Server 7.0
    cpe:2.3:a:ibm:websphere_application_server:7.0
  • IBM WebSphere Application Server 7.0.0.4
    cpe:2.3:a:ibm:websphere_application_server:7.0.0.4
  • IBM WebSphere Application Server 7.0.0.3
    cpe:2.3:a:ibm:websphere_application_server:7.0.0.3
  • IBM WebSphere Application Server 7.0.0.1
    cpe:2.3:a:ibm:websphere_application_server:7.0.0.1
CVSS
Base: 2.1 (as of 14-08-2009 - 09:37)
Impact:
Exploitability:
CWE CWE-255
CAPEC
Access
VectorComplexityAuthentication
LOCAL LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
nessus via4
  • NASL family Web Servers
    NASL id WEBSPHERE_6_1_0_25.NASL
    description IBM WebSphere Application Server 6.1 before Fix Pack 25 appears to be running on the remote host. As such, it is reportedly affected by multiple vulnerabilities : - Non-standard HTTP methods are allowed. (PK73246) - An error in Single Sign-on (SSO) with SPNEGO implementation could allow a remote attacker to bypass security restrictions. (PK77465) - 'wsadmin' is affected by a security exposure. (PK77495) - Security flag 'isSecurityEnabled' is incorrectly set after migrating from VMM. (PK78134) - In certain cases sensitive information may appear in migration trace. (PK78134) - Use of insecure password obfuscation algorithm by Web services could result in weaker than expected security provided the client module specifies a password in ibm-webservicesclient-bind.xmi and target environment has custom password encryption enabled. (PK79275) - Sensitive information might appear in trace files. (PK80337) - XML digital signature is affected by a security issue. (PK80596) - If CSIv2 Security is configured with Identity Assertion, it may be possible for a remote attacker to bypass security restrictions. (PK83097) - IBM Stax XMLStreamWriter may write to an incorrect XML file, and hence is susceptible to a XML fuzzing attack. (PK84015) - Configservice APIs could display sensitive information. (PK84999) - A security bypass caused by inbound requests that lack a SOAPAction or WS-Addressing Action. (PK72138)
    last seen 2019-02-21
    modified 2018-08-06
    plugin id 39450
    published 2009-06-19
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=39450
    title IBM WebSphere Application Server < 6.1.0.25 Multiple Vulnerabilities
  • NASL family Web Servers
    NASL id WEBSPHERE_7_0_0_5.NASL
    description IBM WebSphere Application Server 7.0 before Fix Pack 5 appears to be running on the remote host. As such, it is reportedly affected by multiple vulnerabilities : - Non-standard HTTP methods are allowed. (PK73246) - If the admin console is directly accessed from HTTP, the console fails to redirect the connection to a secure login page. (PK77010) - An error in Single Sign-on (SSO) with SPNEGO implementation could allow a remote attacker to bypass security restrictions. (PK77465) - 'wsadmin' is affected by a security exposure. (PK77495) - Security flag 'isSecurityEnabled' is incorrectly set after migrating from VMM. (PK78134) - Use of insecure password obfuscation algorithm by Web services could result in weaker than expected security provided the client module specifies a password in ibm-webservicesclient-bind.xmi and target environment has custom password encryption enabled. (PK79275) - After upgrading from WebSphere Application Server V6.1 to V7.0 with tracing enabled, an attacker may be able view sensitive information by viewing the trace files. (PK80337) - If CSIv2 Security is configured with Identity Assertion, it may be possible for a remote attacker to bypass security restrictions. (PK83097) - New applications deployed in WebSphere Application Server for z/OS prior to 1.8 are saved on the file system with insecure privileges resulting in disclosure of sensitive information. (PK83308) - Configservice APIs could display sensitive information. (PK84999) - Vulnerabilities in Apache HTTP server could allow a local user to gain elevated privileges. (PK86232) - A error in 'wsadmin' could allow a remote attacker to bypass security restrictions. (PK86328) - A vulnerability in portlet serving enable parameter could allow an attacker to bypass security restrictions and gain unauthorized access to the application. (PK89385)
    last seen 2019-02-21
    modified 2018-08-06
    plugin id 40823
    published 2009-08-31
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=40823
    title IBM WebSphere Application Server 7.0 < Fix Pack 5
refmap via4
aixapar PK79275
confirm
secunia 34461
xf was-webservices-weak-security(52078)
Last major update 24-10-2014 - 01:40
Published 13-08-2009 - 14:30
Last modified 16-08-2017 - 21:30
Back to Top