Vigil@nce - WebSphere AS: privilege escalation via addFileRegistryAccount
July 2014 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker can use an account of WebSphere AS, in order to
escalate his privileges.
– Impacted products: WebSphere AS
– Severity: 2/4
– Creation date: 24/06/2014
DESCRIPTION OF THE VULNERABILITY
The WebSphere AS product can create an account with Virtual Member
Manager SPI Admin Task addFileRegistryAccount.
However, this account can bypass security restrictions. Technical
details are unknown.
An attacker can therefore use an account of WebSphere AS, in order
to escalate his privileges.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
http://vigilance.fr/vulnerability/WebSphere-AS-privilege-escalation-via-addFileRegistryAccount-14931