IBM WebSphere Application Server Default serveServletsbyClassname Setting Lets Remote Users Access the Target System : 8/27/2015 12:48:14 PM
Trial offer - 3 Months of GlowHost goodness for just $1.00 - Choose any shared plan for just 1 buck. From our sponsors |
| Vulnerability Databse |
| This module replaces the description field of a feed to the page it links to (in addition, it wipes out the content:encoded field), so you can get its full text. |
IBM WebSphere Application Server Default serveServletsbyClassname Setting Lets Remote Users Access the Target System
8/27/2015 12:00:00 AM
| IBM WebSphere Application Server Default serveServletsbyClassname Setting Lets Remote Users Access the Target System |
| SecurityTracker Alert ID: 1033383 |
| SecurityTracker URL: http://securitytracker.com/id/1033383 |
| CVE Reference: CVE-2015-1927 (Links to External Site) |
| Date: Aug 27 2015 |
| Impact: User access via network |
| Fix Available: Yes Vendor Confirmed: Yes |
| Version(s): AS 7, 8, 8.5 |
| Description: A vulnerability was reported in IBM WebSphere Application Server. A remote user can gain access to the target system. If an application does not have the correct serveServletsbyClassname setting, the default value allows a remote user can gain access to the target system. |
| Impact: A remote user can gain access to the target application in certain cases. |
| Solution: The vendor has issued a fix (APAR PI31622). The vendor's advisory is available at: http://www-01.ibm.com/support/docview.wss?uid=swg21963275 |
| Vendor URL: www-01.ibm.com/support/docview.wss?uid=swg21963275 (Links to External Site) |
| Cause: Access control error, Configuration error |
| Underlying OS: Linux (Any), UNIX (AIX), UNIX (HP/UX), UNIX (Solaris - SunOS), Windows (Any), z/OS |
| |
| Message History: None. |
You are receiving this email because you subscribed to this feed at feedmyinbox.com
If you no longer wish to receive these emails, you can unsubscribe from this feed, or manage all your subscriptions
Diberdayakan oleh Blogger.