Summary
The host is running IBM WebSphere Application Server and is prone to cross-site scripting vulnerability.
Impact
Successful exploitation will let remote attackers to inject malicious script into a Web page. Further an attacker could use this vulnerability to steal the victim's cookie-based authentication credentials.
Impact Level: Application
Solution
For WebSphere Application Server 6.1:
Apply the latest Fix Pack (6.1.0.29 or later) or APAR PK92057
For WebSphere Application Server 7.1:
Apply the latest Fix Pack (7.0.0.7 or later) or APAR PK92057
For updates refer to http://www.ibm.com/support/docview.wss?uid=swg1PK92057
Insight
The flaw is caused by improper validation of user-supplied input in the Administration Console, which allows the remote attacker to inject malicious script into a Web page.
Affected
IBM WebSphere Application Server (WAS) version 7.1 before 7.0.0.7 IBM WebSphere Application Server (WAS) version 6.1 before 6.1.0.29
References
Severity
Classification
-
CVE CVE-2009-2748 -
CVSS Base Score: 4.3
AV:N/AC:M/Au:N/C:N/I:P/A:N
Related Vulnerabilities
- Aspen Sever Directory Traversal Vulnerability
- httpdx Space Character Remote File Disclosure Vulnerability
- Acme thttpd and mini_httpd Terminal Escape Sequence in Logs Command Injection Vulnerability
- Acritum Femitter Server HTTP Request Remote File Disclosure Vulnerability
- Apache Tomcat Partial HTTP Requests DoS Vulnerability (Windows)