SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |   



Category:   Application (Web Server/CGI)  >   IBM WebSphere Vendors:   IBM
IBM WebSphere Application Server ViewState Settings Lets Remote Users Execute Arbitrary Code on the Target System
SecurityTracker Alert ID:  1041521
SecurityTracker URL:  https://securitytracker.com/id/1041521
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Aug 20 2018
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 7.0, 8.0, 8.5.5
Description:   A vulnerability was reported in IBM WebSphere Application Server. A remote user can execute arbitrary code on the target system.

A remote user can exploit an improper configuration of ViewState settings (if ViewState is configured to use unencrypted state information) to execute arbitrary code residing in the target server's classpath.

The JSF Sun Reference Implementation 1.2 is affected.

Impact:   A remote user can execute arbitrary code that resides in the classpath on the target system.
Solution:   IBM has issued a fix (Interim Fix PI99524).

The IBM advisory is available at:

https://www-01.ibm.com/support/docview.wss?uid=ibm10716525

Vendor URL:  www-01.ibm.com/support/docview.wss?uid=ibm10716525 (Links to External Site)
Cause:   Configuration error
Underlying OS:  Linux (Any), UNIX (AIX), UNIX (HP/UX), UNIX (Solaris - SunOS), Windows (Any), z/OS

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search


Content previously copyright SecurityGlobal.net LLC placed in the public domain on December 31, 2019.