Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | |||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.902610 |
Kategorie: | Web Servers |
Titel: | IBM WebSphere Application Server Multiple CSRF Vulnerabilities |
Zusammenfassung: | The host is running IBM WebSphere Application Server and is; prone to cross-site request forgery vulnerabilities. |
Beschreibung: | Summary: The host is running IBM WebSphere Application Server and is prone to cross-site request forgery vulnerabilities. Vulnerability Insight: The flaws are due to by improper validation of user-supplied input in the Global Security panel and master configuration save functionality. which allows attacker to force a logged-in administrator to perform unwanted actions. Vulnerability Impact: Successful exploitation will allow remote users to gain sensitive information and conduct other malicious activities. Affected Software/OS: IBM WebSphere Application Server (WAS) 7.0.0.13 and prior. Solution: Apply the patch from the referenced advisory. CVSS Score: 6.8 CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P |
Querverweis: |
BugTraq ID: 48305 Common Vulnerability Exposure (CVE) ID: CVE-2010-3271 http://www.securityfocus.com/bid/48305 Bugtraq: 20110615 CORE-2010-1021: IBM WebSphere Application Server Cross-Site Request Forgery (Google Search) http://www.securityfocus.com/archive/1/518465/100/0/threaded http://www.exploit-db.com/exploits/17404 http://www.coresecurity.com/content/IBM-WebSphere-CSRF http://securityreason.com/securityalert/8281 |
Copyright | Copyright (C) 2011 Greenbone Networks GmbH |
Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |