Summary
The host is running IBM WebSphere Application Server and is prone to information disclosure vulnerability.
Impact
Successful exploitation will let remote attackers to obtain plaintext data from a JAX-RPC or JAX-WS Web Services.
Impact Level: Application
Solution
For WebSphere Application Server 6.1:
Apply the latest Fix Pack (6.1.0.39 or later) or APAR PM34841.
For WebSphere Application Server 7.0:
Apply the latest Fix Pack (7.0.0.17 or later) or APAR PM34841.
http://www-01.ibm.com/support/docview.wss?uid=swg21474220
*****
NOTE : Ignore this warning, if above mentioned patch is already applied.
*****
Insight
The flaw is caused by a weak encryption algorithm being used by WS-Security to encrypt data exchanged via a Web Service (JAX-WS or JAX-RPC), which could allow attackers to decrypt the encrypted data contained in web requests.
Affected
IBM WebSphere Application Server versions 6.1 before 6.1.0.39 and 7.0 before 7.0.0.17
References
Severity
Classification
-
CVE CVE-2011-1209 -
CVSS Base Score: 4.3
AV:N/AC:M/Au:N/C:P/I:N/A:N
Related Vulnerabilities
- CommuniGate Pro Web Mail URI Parsing HTML Injection Vulnerability
- GoAhead WebServer Script Source Code Disclosure
- bozotic HTTP server Information Disclosure Vulnerability
- IBM WebSphere Application Server (WAS) XSS and CSRF Vulnerabilities
- Apache Tomcat Parameter Handling Denial of Service Vulnerability (Win)