{"vuid":"VU#573356","idnumber":"573356","name":"IBM WebSphere Application Server contains multiple vulnerabilities","keywords":["CWE-79","CWE-352","IBM","XSS","CSRF"],"overview":"IBM WebSphere Application Server, including the Hypervisor Edition, contains cross-site scripting and cross-site request forgery vulnerabilities.","clean_desc":"CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') - CVE-2014-4770\nIBM WebSphere Application Server, including the Hypervisor Edition, contains a cross-site scripting (XSS) vulnerability in the Administrative Console. CWE-352: Cross-Site Request Forgery (CSRF) - CVE-2014-4816\nIBM WebSphere Application Server, including the Hypervisor Edition, contains a cross-site request forgery (CSRF) vulnerability in the Administrative Console. The application also provides a URL that allows authenticated users to directly create and modify their session variables (\"Session Injection\"), including CSRF tokens. IBM reports that the following versions are affected: Version 8.5 \nVersion 8\nVersion 7\nVersion 6.1 \nVersion 6.0.2 The CVSS score reflects CVE-2014-4770.","impact":"A remote unauthenticated attacker may be able to execute arbitrary script in the context of the end-user's browser session. Additionally, a remote unauthenticated attacker may be able to trick an authenticated user into making an unintentional request to the web server which will be treated as an authentic request and may result in information leakage or modification.","resolution":"IBM provides the following remediation guidance in their security bulletin: The recommended solution is to apply the Interim Fix, Fix Pack or PTF for each named product as soon as practical. Fix: Apply an Interim Fix, Fix Pack or PTF containing APAR PI23055, as noted below: For affected IBM WebSphere Application Server: For V8.5.0.0 through 8.5.5.3: Apply Fix Pack 8.5.5.0 or later\nThen apply Interim Fix PI23055\n--OR--\nApply Fix Pack 8.5.5.4 or later (targeted to be available 8 December 2014). For V8.0.0.0 through 8.0.0.9: Apply Fix Pack 8.0.0.6 or later\nThen apply interim Fix PI23055\n--OR--\nApply Fix Pack 8.0.0.10 or later (targeted to be available 16 February 2015). For V7.0.0.0 through 7.0.0.31: Apply Fix Pack 7.0.0.27 or later\nThen apply Interim Fix PI23055\n--OR--\nApply Fix Pack 7.0.0.35 or later (targeted to be available 13 October 2014). For V6.1.0.0 through 6.1.0.47: Apply Fix Pack 6.1.0.47 and then apply Interim Fix PI23055","workarounds":"","sysaffected":"","thanks":"Thanks to Łukasz Płonka for reporting this vulnerability.","author":"This document was written by Todd Lewellen.","public":["http://www-01.ibm.com/support/docview.wss?uid=swg21682767","http://cwe.mitre.org/data/definitions/79.html","http://cwe.mitre.org/data/definitions/352.html"],"cveids":["CVE-2014-4770","CVE-2014-4816"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2014-07-22T17:20:50Z","publicdate":"2014-09-18T00:00:00Z","datefirstpublished":"2014-10-08T15:35:09Z","dateupdated":"2014-10-16T17:36:52Z","revision":29,"vrda_d1_directreport":"1","vrda_d1_population":"3","vrda_d1_impact":"3","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"N","cvss_accesscomplexity":"M","cvss_authentication":null,"cvss_confidentialityimpact":"P","cvss_integrityimpact":"P","cvss_availabilityimpact":"N","cvss_exploitablity":null,"cvss_remediationlevel":"OF","cvss_reportconfidence":"C","cvss_collateraldamagepotential":"ND","cvss_targetdistribution":"ND","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"4.9","cvss_basevector":"AV:N/AC:M/Au:S/C:P/I:P/A:N","cvss_temporalscore":"3.8","cvss_environmentalscore":"3.86347671297","cvss_environmentalvector":"CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND","metric":0.0,"vulnote":null}