Multiple vulnerabilities have been reported in WebSphere Message Broker, which can be exploited by malicious people to bypass certain security restrictions, manipulate certain data, and cause a DoS (Denial of Service).
1) An error exists when processing WS-Addressing and WS-Security requests, which does not properly check for Basic Authentication and can be exploited to send out unauthenticated messages to remote servers.
2) An unspecified error exists within the HTTPInput nodes, which can be exploited to trigger an infinite loop.
Successful exploitation requires the "Parse Query Strings" option to be enabled.
3) An unspecified error exists within the handling of requests for WSDL files, which can be exploited to manipulate certain data.
The vulnerabilities are reported in versions 6.1, 7.0, and 8.0.
Solution: Update to version 220.127.116.11, 18.104.22.168, or 22.214.171.124 or apply APAR.
Original Advisory: IBM (IC89803, PM75015, IC89383):
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to firstname.lastname@example.org
Subject: IBM WebSphere Message Broker Multiple Vulnerabilities
No posts yet
You must be logged in to post a comment.
Secunia Customer Login
Not a customer already?
Learn more about how our market leading Vulnerability Management solutions can help you manage risk and ensure compliance.