Vigil@nce: WebSphere AS 8.0, five vulnerabilities
October 2011 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker can use several vulnerabilities of Websphere
Application Server.
– Severity: 2/4
– Creation date: 26/09/2011
IMPACTED PRODUCTS
– IBM WebSphere Application Server
DESCRIPTION OF THE VULNERABILITY
Five vulnerabilities were announced in Websphere Application
Server.
An attacker can use the logoutExitPage parameter, in order to
create a redirection. [severity:2/4; 68570, BID-48710,
CVE-2011-1355, PM35701, was-logoutexitpage-security-bypass]
An attacker can send a malicious query to the Administration
Console, in order to generate an error, which displays the stack
trace. [severity:2/4; 68571, BID-48709, CVE-2011-1356, PM36620,
was-admcons-info-disclosure]
An attacker can use a Cross Site Request Forgery on the
administrative console of WebSphere Application Server, in order
to do operations with privileges of the administrator who is
connected to the web site (VIGILANCE-VUL-10754
(https://vigilance.fr/tree/1/10754)). [severity:2/4; 69730,
BID-48305, BID-49766, CVE-2010-3271, CVE-2011-1361, PM36734,
was-cons-csrf]
An attacker can alter SOAP message, without changing their SAML
(Security Assertion Markup Language) signature. [severity:2/4;
PM43254]
An attacker can use a vulnerability of the administration console
of WebSphere Application Server, in order to read a file
(VIGILANCE-VUL-10951 (https://vigilance.fr/tree/1/10951)).
[severity:2/4; BID-49362, CVE-2011-1359, PM45322]
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
http://vigilance.fr/vulnerability/WebSphere-AS-8-0-five-vulnerabilities-11013