2024-07-14 02:06:08 +00:00

116 lines
3.9 KiB
JSON

{
"id": "CVE-2009-0507",
"sourceIdentifier": "cve@mitre.org",
"published": "2009-02-26T16:17:19.843",
"lastModified": "2017-08-08T01:33:58.017",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM WebSphere Process Server (WPS) 6.1.2 before 6.1.2.3 and 6.2 before 6.2.0.1 does not properly restrict configuration data during an export of the cluster configuration file from the administrative console, which allows remote authenticated users to obtain the (1) JMSAPI, (2) ESCALATION, and (3) MAILSESSION (aka mail session) cleartext passwords via vectors involving access to a cluster member."
},
{
"lang": "es",
"value": "IBM WebSphere Process Server (WPS) v6.1.2 anteriores v6.1.2.3 y v6.2 anteriores a v6.2.1.0 no restringen apropiadamente los datos de configuraci\u00f3n durante una exportaci\u00f3n del archivo de configuraci\u00f3n en cluster desde la consola de administraci\u00f3n, lo que permite a usuarios remotos autenticados obtener (1) informaci\u00f3n JMSAPI y (2) informaci\u00f3n de sesi\u00f3n del correo a trav\u00e9s de vectores que implica el acceso a un componente del cluster."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-16"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:websphere_process_server:*:*:*:*:*:*:*:*",
"versionEndIncluding": "6.1.2.2",
"matchCriteriaId": "6B6EE919-5BD1-4F77-9869-A3B7EC38B220"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:websphere_process_server:*:*:*:*:*:*:*:*",
"versionEndIncluding": "6.2",
"matchCriteriaId": "2BD7097A-FBE2-432C-8A76-426181C8F6A5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:websphere_process_server:6.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "07586269-73DA-4189-B0BD-95D4B0091FAD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:websphere_process_server:6.1.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0D43CB11-E506-4014-899E-417BDF7E0929"
}
]
}
]
}
],
"references": [
{
"url": "http://secunia.com/advisories/34249",
"source": "cve@mitre.org"
},
{
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg27015580",
"source": "cve@mitre.org"
},
{
"url": "http://www-1.ibm.com/support/docview.wss?uid=swg1JR30088",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.vupen.com/english/advisories/2009/0670",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48892",
"source": "cve@mitre.org"
}
]
}