IBM WebSphere Application Server Web Container security exposure
|websphere-webcontainer-security-exposure (45122)||High Risk|
An unspecified vulnerability in WebSphere Application Server related to the Web Container's File Serving feature could result in a security exposure when the Custom property fileServingEnabled is set to true. A remote attacker could exploit this vulnerability using unspecified attack vectors to have an unknown impact on the system.IBM3
For WebSphere Application Server 6.0.2:
Apply the latest Fix Pack (126.96.36.199 or later) or APAR PK64302. See References.
Apply the latest Fix Pack (188.8.131.52 or later) or APAR PK64302. See References.
- IBM Support & downloads: Fix list for WebSphere Application Server Version 6.0.2.
- IBM Support & downloads: Fix list for IBM WebSphere Application Server version 6.1.
- BID-31186: IBM WebSphere Application Server 'FileServing' Feature Unspecified Vulnerability
- BID-31839: IBM WebSphere Application Server Denial of Service And Security Bypass Vulnerabilities
- CVE-2008-4111: Unspecified vulnerability in Servlet Engine/Web Container in IBM WebSphere Application Server (WAS) 6.0.2 before 184.108.40.206 and 6.1 before 220.127.116.11, when the FileServing feature is enabled, has unknown impact and attack vectors.
- OSVDB ID: 48143: IBM WebSphere Application Server (WAS) Servlet Engine/Web Container Unspecified Issue (PK64302)
- SA31892: WebSphere Application Server Unspecified Vulnerability
- SA32296: IBM WebSphere Application Server Multiple Vulnerabilities
- VUPEN/ADV-2008-2566: IBM WebSphere Application Server Security Exposure Vulnerabilities
- VUPEN/ADV-2008-2871: WebSphere Application Server Security Bypass and DoS Vulnerabilities
- IBM WebSphere Application Server 6.0.2
- IBM WebSphere Application Server 6.1
Sep 15, 2008
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor (IBM Internet Security Systems X-Force) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.
For corrections or additions please email ignore thisxforceignore this@ignore thisus.ignore thisibm.comignore this
* According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall IBM be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.