Vulnerabilities > CVE-2007-3397 - Information Disclosure vulnerability in IBM WebSphere Application Server Closed Connection
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
NONE Availability impact
NONE Summary
The web container in IBM WebSphere Application Server (WAS) before 6.0.2.21, and 6.1.x before 6.1.0.9, sends response data intended for a different request in certain circumstances after a closed connection error, which might allow remote attackers to obtain sensitive information.
Vulnerable Configurations
Nessus
NASL family Web Servers NASL id WEBSPHERE_6_1_0_9.NASL description IBM WebSphere Application Server 6.1 before Fix Pack 9 appears to be running on the remote host. As such, it is reportedly affected by an information disclosure vulnerability because the application sends response data intended for a different request in certain circumstances after a closed connection error. (PK41446) last seen 2020-06-01 modified 2020-06-02 plugin id 45421 published 2010-04-05 reporter This script is Copyright (C) 2010-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/45421 title IBM WebSphere Application Server 6.1 < 6.1.0.9 Cross-session Information Disclosure code # # (C) Tenable Network Security, Inc. # include("compat.inc"); if (description) { script_id(45421); script_version("1.11"); script_cvs_date("Date: 2018/08/06 14:03:16"); script_cve_id("CVE-2007-3397"); script_bugtraq_id(24608); script_xref(name:"Secunia", value:"25817"); script_name(english:"IBM WebSphere Application Server 6.1 < 6.1.0.9 Cross-session Information Disclosure"); script_summary(english:"Reads the version number from the SOAP port"); script_set_attribute(attribute:"synopsis", value: "The remote application server is affected by an information disclosure vulnerability."); script_set_attribute(attribute:"description", value: "IBM WebSphere Application Server 6.1 before Fix Pack 9 appears to be running on the remote host. As such, it is reportedly affected by an information disclosure vulnerability because the application sends response data intended for a different request in certain circumstances after a closed connection error. (PK41446)"); script_set_attribute(attribute:"see_also",value:"http://www-01.ibm.com/support/docview.wss?uid=swg21404665"); script_set_attribute(attribute:"see_also",value:"http://www-01.ibm.com/support/docview.wss?uid=swg27009778"); script_set_attribute(attribute:"see_also", value:"http://www-1.ibm.com/support/docview.wss?uid=swg21261071"); script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?rs=180&uid=swg24015854"); script_set_attribute(attribute:"solution", value: "If using WebSphere Application Server, apply Fix Pack 9 (6.1.0.9) or later. Otherwise, if using embedded WebSphere Application Server packaged with Tivoli Directory Server, apply the latest recommended eWAS fix pack."); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"exploit_available", value:"false"); script_set_attribute(attribute:"vuln_publication_date", value:"2007/06/25"); script_set_attribute(attribute:"patch_publication_date", value:"2007/05/11"); script_set_attribute(attribute:"plugin_publication_date", value:"2010/04/05"); script_set_attribute(attribute:"plugin_type", value:"remote"); script_set_attribute(attribute:"cpe", value:"cpe:/a:ibm:websphere_application_server"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_family(english:"Web Servers"); script_copyright(english:"This script is Copyright (C) 2010-2018 Tenable Network Security, Inc."); script_dependencies("websphere_detect.nasl"); script_require_ports("Services/www", 8880, 8881); script_require_keys("www/WebSphere"); exit(0); } include("global_settings.inc"); include("misc_func.inc"); include("http.inc"); port = get_http_port(default:8880); version = get_kb_item("www/WebSphere/"+port+"/version"); if (isnull(version)) exit(1, "Failed to extract the version from the IBM WebSphere Application Server instance listening on port " + port + "."); if (version =~ "^[0-9]+(\.[0-9]+)?$") exit(1, "Failed to extract a granular version from the IBM WebSphere Application Server instance listening on port " + port + "."); ver = split(version, sep:'.', keep:FALSE); for (i=0; i<max_index(ver); i++) ver[i] = int(ver[i]); if (ver[0] == 6 && ver[1] == 1 && ver[2] == 0 && ver[3] < 9) { if (report_verbosity > 0) { source = get_kb_item_or_exit("www/WebSphere/"+port+"/source"); report = '\n Source : ' + source + '\n Installed version : ' + version + '\n Fixed version : 6.1.0.9' + '\n'; security_warning(port:port, extra:report); } else security_warning(port); exit(0); } else exit(0, "The WebSphere Application Server "+version+" instance listening on port "+port+" is not affected.");
NASL family Web Servers NASL id WEBSPHERE_6_0_2_21.NASL description IBM WebSphere Application Server 6.0.x before Fix Pack 21 appears to be running on the remote host. Such versions are reportedly affected by multiple vulnerabilities. - The web container sends response data intended for a different request in certain circumstances after a closed connection error. (PK41446) - Multiple unspecified vulnerabilities. (PK33799, PK40213) last seen 2020-06-01 modified 2020-06-02 plugin id 45417 published 2010-04-05 reporter This script is Copyright (C) 2010-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/45417 title IBM WebSphere Application Server 6.0 < 6.0.2.21 Multiple Vulnerabilities