Summary
The host is running IBM WebSphere Application Server and is prone to security bypass vulnerability.
Impact
Successful exploitation could allow an attacker to bypass the authentication process to and gain unauthorized access to the system with the privileges of the victim.
Impact Level: Application
Solution
Upgrade to IBM WAS version 6.1.0.15 or later,
For updates refer to http://www-01.ibm.com/support/docview.wss?uid=swg1PK54565
Insight
The flaw is due to an error in invoking an internal login module, wlogin method, which is not properly handling an application hashtable login. This allows attackers to perform an internal application hashtable login by providing an empty password.
Affected
IBM WAS Version 6.1.0.9
References
Severity
Classification
-
CVE CVE-2008-7274 -
CVSS Base Score: 4.3
AV:N/AC:M/Au:N/C:N/I:P/A:N
Related Vulnerabilities
- Apache Tomcat Hash Collision Denial Of Service Vulnerability
- Apache Tomcat Parameter Handling Denial of Service Vulnerability (Win)
- Apache HTTP Server 'mod_proxy' Reverse Proxy Information Disclosure Vulnerability
- IBM WebSphere Application Server (WAS) Cross-site Scripting Vulnerability
- Cross-Site Scripting in Cherokee Error Pages