Vulnerabilities > CVE-2013-2976 - Information Exposure vulnerability in IBM Websphere Application Server

047910
CVSS 1.9 - LOW
Attack vector
LOCAL
Attack complexity
MEDIUM
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
NONE
Availability impact
NONE
local
ibm
CWE-200
nessus

Summary

The Administrative console in IBM WebSphere Application Server (WAS) 6.1 before 6.1.0.47, 7.0 before 7.0.0.29, 8.0 before 8.0.0.7, and 8.5 before 8.5.5.0 does not properly perform caching, which allows local users to obtain sensitive information via unspecified vectors.

Vulnerable Configurations

Part Description Count
Application
Ibm
72

Common Weakness Enumeration (CWE)

Common Attack Pattern Enumeration and Classification (CAPEC)

  • Subverting Environment Variable Values
    The attacker directly or indirectly modifies environment variables used by or controlling the target software. The attacker's goal is to cause the target software to deviate from its expected operation in a manner that benefits the attacker.
  • Footprinting
    An attacker engages in probing and exploration activity to identify constituents and properties of the target. Footprinting is a general term to describe a variety of information gathering techniques, often used by attackers in preparation for some attack. It consists of using tools to learn as much as possible about the composition, configuration, and security mechanisms of the targeted application, system or network. Information that might be collected during a footprinting effort could include open ports, applications and their versions, network topology, and similar information. While footprinting is not intended to be damaging (although certain activities, such as network scans, can sometimes cause disruptions to vulnerable applications inadvertently) it may often pave the way for more damaging attacks.
  • Exploiting Trust in Client (aka Make the Client Invisible)
    An attack of this type exploits a programs' vulnerabilities in client/server communication channel authentication and data integrity. It leverages the implicit trust a server places in the client, or more importantly, that which the server believes is the client. An attacker executes this type of attack by placing themselves in the communication channel between client and server such that communication directly to the server is possible where the server believes it is communicating only with a valid client. There are numerous variations of this type of attack.
  • Browser Fingerprinting
    An attacker carefully crafts small snippets of Java Script to efficiently detect the type of browser the potential victim is using. Many web-based attacks need prior knowledge of the web browser including the version of browser to ensure successful exploitation of a vulnerability. Having this knowledge allows an attacker to target the victim with attacks that specifically exploit known or zero day weaknesses in the type and version of the browser used by the victim. Automating this process via Java Script as a part of the same delivery system used to exploit the browser is considered more efficient as the attacker can supply a browser fingerprinting method and integrate it with exploit code, all contained in Java Script and in response to the same web page request by the browser.
  • Session Credential Falsification through Prediction
    This attack targets predictable session ID in order to gain privileges. The attacker can predict the session ID used during a transaction to perform spoofing and session hijacking.

Nessus

  • NASL familyWeb Servers
    NASL idWEBSPHERE_7_0_0_29.NASL
    descriptionIBM WebSphere Application Server 7.0 before Fix Pack 29 appears to be running on the remote host. It is, therefore, potentially affected by the following vulnerabilities : - The TLS protocol in the GSKIT component is vulnerable to a plaintext recovery attack. (CVE-2013-0169, PM85211) - The WS-Security run time contains a flaw that could be triggered by a specially crafted SOAP request to execute arbitrary code. (CVE-2013-0482, PM76582) - A denial of service vulnerability exists, caused by a buffer overflow on localOS registry when using WebSphere Identity Manager (WIM). (CVE-2013-0541, PM74909) - An unspecified cross-site scripting vulnerability exists related to the administrative console. (CVE-2013-0542, CVE-2013-2967, PM78614, PM81846) - A validation flaw exists relating to
    last seen2020-06-01
    modified2020-06-02
    plugin id68982
    published2013-07-19
    reporterThis script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/68982
    titleIBM WebSphere Application Server 7.0 < Fix Pack 29 Multiple Vulnerabilities
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(68982);
      script_version("1.9");
      script_cvs_date("Date: 2019/11/27");
    
      script_cve_id(
        "CVE-2013-0169",
        "CVE-2013-0482",
        "CVE-2013-0541",
        "CVE-2013-0542",
        "CVE-2013-0543",
        "CVE-2013-0544",
        "CVE-2013-0597",
        "CVE-2013-1768",
        "CVE-2013-2967",
        "CVE-2013-2976",
        "CVE-2013-3029"
      );
      script_bugtraq_id(
        57778,
        59247,
        59248,
        59250,
        59251,
        59650,
        60534,
        60724
      );
    
      script_name(english:"IBM WebSphere Application Server 7.0 < Fix Pack 29 Multiple Vulnerabilities");
      script_summary(english:"Reads the version number from the SOAP port");
    
      script_set_attribute(attribute:"synopsis", value:
    "The remote application server is potentially affected by multiple
    vulnerabilities.");
      script_set_attribute(attribute:"description", value:
    "IBM WebSphere Application Server 7.0 before Fix Pack 29 appears to be
    running on the remote host.  It is, therefore, potentially affected by
    the following vulnerabilities :
    
      - The TLS protocol in the GSKIT component is vulnerable
        to a plaintext recovery attack. (CVE-2013-0169, PM85211)
    
      - The WS-Security run time contains a flaw that could be
        triggered by a specially crafted SOAP request to execute
        arbitrary code. (CVE-2013-0482, PM76582)
    
      - A denial of service vulnerability exists, caused by a
        buffer overflow on localOS registry when using WebSphere
        Identity Manager (WIM). (CVE-2013-0541, PM74909)
    
      - An unspecified cross-site scripting vulnerability exists
        related to the administrative console. (CVE-2013-0542,
        CVE-2013-2967, PM78614, PM81846)
    
      - A validation flaw exists relating to 'Local OS
        registries' that may allow a remote attacker to bypass
        security. (CVE-2013-0543, PM75582)
    
      - A directory traversal vulnerability exists in the
        administrative console via the 'PARAMETER' parameter.
        (CVE-2013-0544, PM82468)
    
      - A flaw exists relating to OAuth that could allow a
        remote attacker to obtain someone else's credentials.
        (CVE-2013-0597, PM85834, PM87131)
    
      - A flaw exists relating to OpenJPA that is triggered
        during deserialization that may allow a remote attacker
        to write to the file system and potentially execute
        arbitrary code. (CVE-2013-1768, PM86780, PM86786,
        PM86788, PM86791)
    
      - An information disclosure issue exists relating to
        incorrect caching by the administrative console.
        (CVE-2013-2976, PM79992)
    
      - A user-supplied input validation error exists that could
        allow cross-site request (CSRF) attacks to be carried
        out. (CVE-2013-3029, PM88746)");
      # https://www-304.ibm.com/connections/blogs/PSIRT/entry/security_bulletin_potential_security_vulnerabilities_fixed_in_ibm_websphere_application_server_7_0_0_29?lang=en_us
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?0379569f");
      script_set_attribute(attribute:"see_also", value:"https://www-304.ibm.com/support/docview.wss?uid=swg21640799");
      script_set_attribute(attribute:"solution", value:
    "If using WebSphere Application Server, apply Fix Pack 29 (7.0.0.29)
    or later.
    
    Otherwise, if using embedded WebSphere Application Server packaged
    with Tivoli Directory Server, apply the latest recommended eWAS fix
    pack.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"cvss_score_source", value:"CVE-2013-1768");
    
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
      script_cwe_id(20, 74, 79, 442, 629, 711, 712, 722, 725, 750, 751, 800, 801, 809, 811, 864, 900, 928, 931, 990);
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2013/02/04");
      script_set_attribute(attribute:"patch_publication_date", value:"2013/06/25");
      script_set_attribute(attribute:"plugin_publication_date", value:"2013/07/19");
    
      script_set_attribute(attribute:"plugin_type", value:"remote");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:ibm:websphere_application_server");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"Web Servers");
    
      script_copyright(english:"This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
    
      script_dependencies("websphere_detect.nasl");
      script_require_keys("www/WebSphere");
      script_require_ports("Services/www", 8880, 8881);
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    include("http.inc");
    
    
    port = get_http_port(default:8880, embedded:0);
    
    
    version = get_kb_item_or_exit("www/WebSphere/"+port+"/version");
    if (version =~ "^[0-9]+(\.[0-9]+)?$")
      exit(1, "Failed to extract a granular version from the IBM WebSphere Application Server " + version + " instance listening on port " + port + ".");
    
    ver = split(version, sep:'.', keep:FALSE);
    for (i=0; i<max_index(ver); i++)
      ver[i] = int(ver[i]);
    
    if (ver[0] == 7 && ver[1] == 0 && ver[2] == 0 && ver[3] < 29)
    {
      set_kb_item(name:'www/'+port+'/XSS', value:TRUE);
      set_kb_item(name:'www/'+port+'/XSRF', value:TRUE);
    
      if (report_verbosity > 0)
      {
        source = get_kb_item_or_exit("www/WebSphere/"+port+"/source");
        report =
          '\n  Version source    : ' + source +
          '\n  Installed version : ' + version +
          '\n  Fixed version     : 7.0.0.29' +
          '\n';
        security_hole(port:port, extra:report);
      }
      else security_hole(port);
      exit(0);
    }
    else audit(AUDIT_LISTEN_NOT_VULN, "WebSphere", port, version);
    
  • NASL familyWeb Servers
    NASL idWEBSPHERE_8_5_5.NASL
    descriptionIBM WebSphere Application Server 8.5 before Fix Pack 8.5.5 appears to be running on the remote host and is, therefore, potentially affected by the following vulnerabilities : - The TLS protocol in the GSKIT component is vulnerable to a plaintext recovery attack. (CVE-2013-0169, PM85211) - The WS-Security run time contains a flaw that could be triggered by a specially crafted SOAP request to execute arbitrary code. (CVE-2013-0482, PM76582) - A flaw exists relating to OAuth that could allow a remote attacker to obtain someone else
    last seen2020-06-01
    modified2020-06-02
    plugin id69021
    published2013-07-23
    reporterThis script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/69021
    titleIBM WebSphere Application Server 8.5 < Fix Pack 8.5.5 Multiple Vulnerabilities
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    
    include("compat.inc");
    
    
    if (description)
    {
      script_id(69021);
      script_version("1.8");
      script_cvs_date("Date: 2019/11/27");
    
      script_cve_id(
        "CVE-2013-0169",
        "CVE-2013-0482",
        "CVE-2013-0597",
        "CVE-2013-1768",
        "CVE-2013-2967",
        "CVE-2013-2975",
        "CVE-2013-2976",
        "CVE-2013-3024"
      );
      script_bugtraq_id(
        57778,
        59650,
        60534,
        60724
      );
    
      script_name(english:"IBM WebSphere Application Server 8.5 < Fix Pack 8.5.5 Multiple Vulnerabilities");
      script_summary(english:"Reads the version number from the SOAP port");
    
      script_set_attribute(attribute:"synopsis", value:
    "The remote application server may be affected by multiple
    vulnerabilities.");
      script_set_attribute(attribute:"description", value:
    "IBM WebSphere Application Server 8.5 before Fix Pack 8.5.5 appears to
    be running on the remote host and is, therefore, potentially affected by
    the following vulnerabilities :
    
      - The TLS protocol in the GSKIT component is vulnerable
        to a plaintext recovery attack. (CVE-2013-0169, PM85211)
    
      - The WS-Security run time contains a flaw that could be
        triggered by a specially crafted SOAP request to execute
        arbitrary code. (CVE-2013-0482, PM76582)
    
      - A flaw exists relating to OAuth that could allow a
        remote attacker to obtain someone else's credentials.
        (CVE-2013-0597, PM85834, PM87131)
    
      - A flaw exists relating to OpenJPA that is triggered
        during deserialization, which could allow a remote
        attacker to write to the file system and potentially
        execute arbitrary code. (CVE-2013-1768, PM86780,
        PM86786, PM86788, PM86791)
    
      - An unspecified cross-site scripting vulnerability exists
        related to the administrative console. (CVE-2013-2967,
        PM78614)
    
      - An unspecified vulnerability exists.  (CVE-2013-2975)
    
      - An information disclosure vulnerability exists relating
        to incorrect caching by the administrative console.
        (CVE-2013-2976, PM79992)
    
      - An improper process initialization flaw exists on UNIX
        platforms that could allow a local attacker to execute
        arbitrary commands. (CVE-2013-3024, PM86245)");
      script_set_attribute(attribute:"see_also", value:"https://www-304.ibm.com/support/docview.wss?&uid=swg21639553");
      # https://www-304.ibm.com/connections/blogs/PSIRT/entry/security_bulletin_potential_security_vulnerabilities_fixed_in_ibm_websphere_application_server_8_5_5?lang=en_us
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?aa3b02e5");
      script_set_attribute(attribute:"solution", value:
    "Apply Fix Pack 8.5.5 for version 8.5 (8.5.5.0) or later.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"cvss_score_source", value:"CVE-2013-1768");
    
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
      script_cwe_id(20, 74, 79, 442, 629, 711, 712, 722, 725, 750, 751, 800, 801, 809, 811, 864, 900, 928, 931, 990);
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2013/02/04");
      script_set_attribute(attribute:"patch_publication_date", value:"2013/07/01");
      script_set_attribute(attribute:"plugin_publication_date", value:"2013/07/23");
    
      script_set_attribute(attribute:"plugin_type", value:"remote");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:ibm:websphere_application_server");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"Web Servers");
    
      script_copyright(english:"This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
    
      script_dependencies("websphere_detect.nasl");
      script_require_keys("www/WebSphere");
      script_require_ports("Services/www", 8880, 8881);
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    include("http.inc");
    
    
    port = get_http_port(default:8880, embedded:0);
    
    version = get_kb_item_or_exit("www/WebSphere/"+port+"/version");
    source = get_kb_item_or_exit("www/WebSphere/"+port+"/source");
    
    if (version !~ "^8\.5([^0-9]|$)") exit(0, "The version of the IBM WebSphere Application Server instance listening on port "+port+" is "+version+", not 8.5.");
    
    if (version =~ "^[0-9]+(\.[0-9]+)?$")
      exit(1, "Failed to extract a granular version from the IBM WebSphere Application Server instance listening on port " + port + ".");
    
    ver = split(version, sep:'.', keep:FALSE);
    for (i=0; i<max_index(ver); i++)
      ver[i] = int(ver[i]);
    
    if (ver[0] == 8 && ver[1] == 5 && ver[2] < 5)
    {
      set_kb_item(name:'www/'+port+'/XSS', value:TRUE);
      if (report_verbosity > 0)
      {
        report =
          '\n  Version source    : ' + source +
          '\n  Installed version : ' + version +
          '\n  Fixed version     : 8.5.5' +
          '\n';
        security_hole(port:port, extra:report);
      }
      else security_hole(port);
      exit(0);
    }
    else audit(AUDIT_LISTEN_NOT_VULN, "WebSphere", port, version);
    
  • NASL familyWeb Servers
    NASL idWEBSPHERE_8_0_0_7.NASL
    descriptionIBM WebSphere Application Server 8.0 before Fix Pack 7 appears to be running on the remote host. It is, therefore, potentially affected by the following vulnerabilities : - A flaw exists related to Apache Ant and file compression that could lead to denial of service conditions. (CVE-2012-2098 / PM90088) - The TLS protocol in the GSKIT component is vulnerable to a plaintext recovery attack. (CVE-2013-0169 / PM85211) - A flaw exists relating to OAuth that could allow a remote attacker to obtain someone else
    last seen2020-06-01
    modified2020-06-02
    plugin id69449
    published2013-08-23
    reporterThis script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/69449
    titleIBM WebSphere Application Server 8.0 < Fix Pack 7 Multiple Vulnerabilities
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    
    
    
    include("compat.inc");
    
    if (description)
    {
      script_id(69449);
      script_version("1.19");
      script_cvs_date("Date: 2019/11/27");
    
      script_cve_id(
        "CVE-2012-2098",
        "CVE-2013-0169",
        "CVE-2013-0597",
        "CVE-2013-1768",
        "CVE-2013-1862",
        "CVE-2013-1896",
        "CVE-2013-2967",
        "CVE-2013-2976",
        "CVE-2013-3029",
        "CVE-2013-4004",
        "CVE-2013-4005"
      );
      script_bugtraq_id(
        53676,
        57778,
        59826,
        60534,
        60724,
        61129,
        61901,
        61935,
        61937,
        61940,
        61941
      );
    
      script_name(english:"IBM WebSphere Application Server 8.0 < Fix Pack 7 Multiple Vulnerabilities");
      script_summary(english:"Reads the version number from the SOAP port");
    
      script_set_attribute(attribute:"synopsis", value:
    "The remote application server may be affected by multiple
    vulnerabilities.");
      script_set_attribute(attribute:"description", value:
    "IBM WebSphere Application Server 8.0 before Fix Pack 7 appears to be
    running on the remote host.  It is, therefore, potentially affected by
    the following vulnerabilities :
    
      - A flaw exists related to Apache Ant and file
        compression that could lead to denial of service
        conditions. (CVE-2012-2098 / PM90088)
    
      - The TLS protocol in the GSKIT component is vulnerable
        to a plaintext recovery attack.
        (CVE-2013-0169 / PM85211)
    
      - A flaw exists relating to OAuth that could allow a
        remote attacker to obtain someone else's credentials.
        (CVE-2013-0597 / PM85834 / PM87131)
    
      - A flaw exists relating to OpenJPA that is triggered
        during deserialization, which could allow a remote
        attacker to write to the file system and potentially
        execute arbitrary code. Note the vendor states this
        application is not directly affected by this flaw;
        however, this application does include the affected
        version of OpenJPA. (CVE-2013-1768 / PM86780)
    
      - An input validation flaw exists in the optional
        'mod_rewrite' module in the included IBM HTTP Server
        that could allow arbitrary command execution via
        HTTP requests containing certain escape sequences.
        (CVE-2013-1862 / PM87808)
    
      - A flaw exists related to the optional 'mod_dav'
        module in the included IBM HTTP Server that could
        allow denial of service conditions.
        (CVE-2013-1896 / PM89996)
    
      - User-supplied input validation errors exist related to
        the administrative console that could allow cross-site
        scripting attacks.
        (CVE-2013-2967 / PM78614, CVE-2013-4004 / PM81571,
        CVE-2013-4005 / PM88208)
    
      - An information disclosure vulnerability exists related
        to incorrect caching by the administrative console.
        (CVE-2013-2976 / PM79992)
    
      - A user-supplied input validation error exists that could
        allow cross-site request forgery (CSRF) attacks to be
        carried out. (CVE-2013-3029 / PM88746)");
      # https://www-304.ibm.com/connections/blogs/PSIRT/entry/security_bulletin_potential_security_exposure_in_ibm_http_server_cve_2013_1862_pm87808?lang=en_us
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?187690fd");
      script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?uid=swg21644047");
      script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?uid=swg24035457");
      # https://www-304.ibm.com/connections/blogs/PSIRT/entry/security_bulletin_potential_security_vulnerabilities_fixed_in_ibm_websphere_application_server_8_0_0_7?lang=en_us
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?b1c66192");
      script_set_attribute(attribute:"solution", value:
    "Apply Fix Pack 7 for version 8.0 (8.0.0.7) or later.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"cvss_score_source", value:"CVE-2013-1768");
    
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
      script_cwe_id(20, 74, 79, 442, 629, 711, 712, 722, 725, 750, 751, 800, 801, 809, 811, 864, 900, 928, 931, 990);
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2012/05/23");
      script_set_attribute(attribute:"patch_publication_date", value:"2013/08/19");
      script_set_attribute(attribute:"plugin_publication_date", value:"2013/08/23");
    
      script_set_attribute(attribute:"plugin_type", value:"remote");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:ibm:websphere_application_server");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"Web Servers");
    
      script_copyright(english:"This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
    
      script_dependencies("websphere_detect.nasl");
      script_require_keys("www/WebSphere");
      script_require_ports("Services/www", 8880, 8881);
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    include("http.inc");
    
    
    port = get_http_port(default:8880, embedded:0);
    
    
    version = get_kb_item_or_exit("www/WebSphere/"+port+"/version");
    if (version =~ "^[0-9]+(\.[0-9]+)?$")
      exit(1, "Failed to extract a granular version from the IBM WebSphere Application Server " + version + " instance listening on port " + port + ".");
    
    ver = split(version, sep:'.', keep:FALSE);
    for (i=0; i<max_index(ver); i++)
      ver[i] = int(ver[i]);
    
    if (ver[0] == 8 && ver[1] == 0 && ver[2] == 0 && ver[3] < 7)
    {
      set_kb_item(name:"www/"+port+"/XSS", value:TRUE);
      set_kb_item(name:"www/"+port+"/XSRF", value:TRUE);
      if (report_verbosity > 0)
      {
        source = get_kb_item_or_exit("www/WebSphere/"+port+"/source");
        report =
          '\n  Version source    : ' + source +
          '\n  Installed version : ' + version +
          '\n  Fixed version     : 8.0.0.7' +
          '\n';
        security_hole(port:port, extra:report);
      }
      else security_hole(port);
      exit(0);
    }
    else audit(AUDIT_LISTEN_NOT_VULN, "WebSphere", port, version);
    
  • NASL familyWeb Servers
    NASL idWEBSPHERE_6_1_0_47.NASL
    descriptionIBM WebSphere Application Server 6.1 before Fix Pack 47 appears to be running on the remote host. As such, it is potentially affected by the following vulnerabilities : - A remote attacker can bypass authentication because of improper user validation on Linux, Solaris, and HP-UX platforms that use a LocalOS registry. (CVE-2013-0543, PM75582) - A denial of service can be caused by the way Apache Ant uses bzip2 to compress files. This can be exploited by a local attacker passing specially crafted input. (CVE-2012-2098, PM90088) - A local attacker can cause a denial of service on Windows platforms with a LocalOS registry using WebSphere Identity Manager. (CVE-2013-0541, PM74909) - Remote attackers can traverse directories by deploying a specially crafted application file to overwrite files outside of the application deployment directory. (CVE-2012-3305, PM62467) - The TLS protocol implementation is susceptible to plaintext-recovery attacks via statistical analysis of timing data for crafted packets. (CVE-2013-0169, PM85211) - Terminal escape sequences are not properly filtered from logs. Remote attackers could execute arbitrary commands via an HTTP request containing an escape sequence. (CVE-2013-1862, PM87808) - Improper validation of user input allows for cross-site request forgery. By persuading an authenticated user to visit a malicious website, a remote attacker could exploit this vulnerability to obtain sensitive information. (CVE-2012-4853, CVE-2013-3029, PM62920, PM88746) - Improper validation of user input in the administrative console allows for multiple cross-site scripting attacks. (CVE-2013-0458, CVE-2013-0459, CVE-2013-0461, CVE-2013-0542, CVE-2013-0596, CVE-2013-2967, CVE-2013-4005, CVE-2013-4052, PM71139, PM72536, PM71389, PM73445, PM78614, PM81846, PM88208, PM91892) - Improper validation of portlets in the administrative console allows for cross-site request forgery, which could allow an attacker to obtain sensitive information. (CVE-2013-0460, PM72275) - Remote, authenticated attackers can traverse directories on Linux and UNIX systems running the application. (CVE-2013-0544, PM82468) - A denial of service attack is possible if the optional mod_dav module is being used. (CVE-2013-1896, PM89996) - Sensitive information can be obtained by a local attacker because of incorrect caching by the administrative console. (CVE-2013-2976, PM79992) - An attacker may gain elevated privileges because of improper certificate checks. WS-Security and XML Digital Signatures must be enabled. (CVE-2013-4053, PM90949, PM91521) - Deserialization of a maliciously crafted OpenJPA object can result in an executable file being written to the file system. WebSphere is NOT vulnerable to this issue but the vendor suggests upgrading to be proactive. (CVE-2013-1768, PM86780, PM86786, PM86788, PM86791)
    last seen2020-06-01
    modified2020-06-02
    plugin id70022
    published2013-09-20
    reporterThis script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/70022
    titleIBM WebSphere Application Server 6.1 < Fix Pack 47 Multiple Vulnerabilities
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    
    
    
    include("compat.inc");
    
    if (description)
    {
      script_id(70022);
      script_version("1.14");
      script_cvs_date("Date: 2019/11/27");
    
      script_cve_id(
        "CVE-2012-2098",
        "CVE-2012-3305",
        "CVE-2012-4853",
        "CVE-2013-0169",
        "CVE-2013-0458",
        "CVE-2013-0459",
        "CVE-2013-0460",
        "CVE-2013-0461",
        "CVE-2013-0462",
        "CVE-2013-0541",
        "CVE-2013-0542",
        "CVE-2013-0543",
        "CVE-2013-0544",
        "CVE-2013-0596",
        "CVE-2013-1768",
        "CVE-2013-1862",
        "CVE-2013-1896",
        "CVE-2013-2967",
        "CVE-2013-2976",
        "CVE-2013-3029",
        "CVE-2013-4005",
        "CVE-2013-4052",
        "CVE-2013-4053"
      );
      script_bugtraq_id(
        53676,
        55678,
        56458,
        57508,
        57509,
        57510,
        57512,
        57513,
        57778,
        59247,
        59248,
        59250,
        59251,
        59826,
        60534,
        61129,
        61901,
        61937,
        61940,
        61941,
        62336,
        62338
      );
    
      script_name(english:"IBM WebSphere Application Server 6.1 < Fix Pack 47 Multiple Vulnerabilities");
      script_summary(english:"Reads the version number from the SOAP port");
    
      script_set_attribute(attribute:"synopsis", value:
    "The remote application server may be affected by multiple
    vulnerabilities.");
      script_set_attribute(attribute:"description", value:
    "IBM WebSphere Application Server 6.1 before Fix Pack 47 appears to be
    running on the remote host.  As such, it is potentially affected by the
    following vulnerabilities :
    
      - A remote attacker can bypass authentication because of
        improper user validation on Linux, Solaris, and HP-UX
        platforms that use a LocalOS registry.
        (CVE-2013-0543, PM75582)
    
      - A denial of service can be caused by the way Apache
        Ant uses bzip2 to compress files. This can be exploited
        by a local attacker passing specially crafted input.
        (CVE-2012-2098, PM90088)
    
      - A local attacker can cause a denial of service on
        Windows platforms with a LocalOS registry using
        WebSphere Identity Manager. (CVE-2013-0541, PM74909)
    
      - Remote attackers can traverse directories by deploying
        a specially crafted application file to overwrite files
        outside of the application deployment directory.
        (CVE-2012-3305, PM62467)
    
      - The TLS protocol implementation is susceptible to
        plaintext-recovery attacks via statistical analysis of
        timing data for crafted packets. (CVE-2013-0169,
        PM85211)
    
      - Terminal escape sequences are not properly filtered from
        logs. Remote attackers could execute arbitrary commands
        via an HTTP request containing an escape sequence.
        (CVE-2013-1862, PM87808)
    
      - Improper validation of user input allows for cross-site
        request forgery. By persuading an authenticated user
        to visit a malicious website, a remote attacker could
        exploit this vulnerability to obtain sensitive
        information. (CVE-2012-4853, CVE-2013-3029, PM62920,
        PM88746)
    
      - Improper validation of user input in the administrative
        console allows for multiple cross-site scripting
        attacks. (CVE-2013-0458, CVE-2013-0459, CVE-2013-0461,
        CVE-2013-0542, CVE-2013-0596, CVE-2013-2967,
        CVE-2013-4005, CVE-2013-4052, PM71139, PM72536, PM71389,
        PM73445, PM78614, PM81846, PM88208, PM91892)
    
      - Improper validation of portlets in the administrative
        console allows for cross-site request forgery, which
        could allow an attacker to obtain sensitive information.
        (CVE-2013-0460, PM72275)
    
      - Remote, authenticated attackers can traverse directories
        on Linux and UNIX systems running the application.
        (CVE-2013-0544, PM82468)
    
      - A denial of service attack is possible if the optional
        mod_dav module is being used. (CVE-2013-1896, PM89996)
    
      - Sensitive information can be obtained by a local
        attacker because of incorrect caching by the
        administrative console. (CVE-2013-2976, PM79992)
    
      - An attacker may gain elevated privileges because of
        improper certificate checks. WS-Security and XML Digital
        Signatures must be enabled. (CVE-2013-4053, PM90949,
        PM91521)
    
      - Deserialization of a maliciously crafted OpenJPA object
        can result in an executable file being written to the
        file system. WebSphere is NOT vulnerable to this issue
        but the vendor suggests upgrading to be proactive.
        (CVE-2013-1768, PM86780, PM86786, PM86788, PM86791)");
      # https://www-304.ibm.com/connections/blogs/PSIRT/entry/security_bulletin_potential_security_exposure_in_ibm_http_server_cve_2013_1862_pm87808?lang=en_us
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?187690fd");
      script_set_attribute(attribute:"see_also", value:"https://www-304.ibm.com/support/docview.wss?uid=swg21647522");
      script_set_attribute(attribute:"see_also", value:"http://www-01.ibm.com/support/docview.wss?uid=swg24035508");
      script_set_attribute(attribute:"see_also", value:"https://www-304.ibm.com/support/docview.wss?&uid=swg27004980#ver61");
      script_set_attribute(attribute:"solution", value:
    "If using WebSphere Application Server, apply Fix Pack 47 (6.1.0.47)
    or later.
    
    Otherwise, if using embedded WebSphere Application Server packaged with
    Tivoli Directory Server, apply the latest recommended eWAS fix pack.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"cvss_score_source", value:"CVE-2013-0462");
    
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
      script_cwe_id(20, 74, 79, 442, 629, 711, 712, 722, 725, 750, 751, 800, 801, 809, 811, 864, 900, 928, 931, 990);
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2012/05/23");
      script_set_attribute(attribute:"patch_publication_date", value:"2013/09/11");
      script_set_attribute(attribute:"plugin_publication_date", value:"2013/09/20");
    
      script_set_attribute(attribute:"plugin_type", value:"remote");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:ibm:websphere_application_server");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"Web Servers");
    
      script_copyright(english:"This script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
    
      script_dependencies("websphere_detect.nasl");
      script_require_keys("www/WebSphere");
      script_require_ports("Services/www", 8880, 8881);
    
      exit(0);
    }
    
    
    include("global_settings.inc");
    include("audit.inc");
    include("misc_func.inc");
    include("http.inc");
    
    
    port = get_http_port(default:8880, embedded:0);
    
    
    version = get_kb_item_or_exit("www/WebSphere/"+port+"/version");
    if (version =~ "^[0-9]+(\.[0-9]+)?$")
      exit(1, "Failed to extract a granular version from the IBM WebSphere Application Server instance listening on port " + port + ".");
    
    ver = split(version, sep:'.', keep:FALSE);
    for (i=0; i<max_index(ver); i++)
      ver[i] = int(ver[i]);
    
    if (ver[0] == 6 && ver[1] == 1 && ver[2] == 0 && ver[3] < 47)
    {
      set_kb_item(name:'www/'+port+'/XSS', value:TRUE);
      set_kb_item(name:'www/'+port+'/XSRF', value:TRUE);
    
      if (report_verbosity > 0)
      {
        source = get_kb_item_or_exit("www/WebSphere/"+port+"/source");
    
        report =
          '\n  Version source    : ' + source +
          '\n  Installed version : ' + version +
          '\n  Fixed version     : 6.1.0.47' +
          '\n';
        security_hole(port:port, extra:report);
      }
      else security_hole(port);
      exit(0);
    }
    else audit(AUDIT_LISTEN_NOT_VULN, "WebSphere", port, version);