The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Computer vulnerabilities of IBM WebSphere Application Server Traditional

computer vulnerability announce CVE-2018-20843

Expat: infinite loop via XML Names Large Colons

Synthesis of the vulnerability

An attacker can trigger an infinite loop via XML Names Large Colons of Expat, in order to trigger a denial of service.
Impacted products: Debian, BIG-IP Hardware, TMOS, Fedora, WebSphere AS Traditional, openSUSE Leap, SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Severity: 2/4.
Consequences: denial of service on service, denial of service on client.
Provenance: document.
Creation date: 27/06/2019.
Identifiers: 964768, CVE-2018-20843, DLA-1839-1, DSA-4472-1, FEDORA-2019-139fcda84d, FEDORA-2019-18868e1715, K51011533, openSUSE-SU-2019:1777-1, SUSE-SU-2019:1834-1, SUSE-SU-2019:1835-1, USN-4040-1, USN-4040-2, VIGILANCE-VUL-29637.

Description of the vulnerability

An attacker can trigger an infinite loop via XML Names Large Colons of Expat, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability alert CVE-2019-4269

IBM WebSphere AS: information disclosure via Admin Console

Synthesis of the vulnerability

An attacker can bypass access restrictions to data via Admin Console of IBM WebSphere AS, in order to obtain sensitive information.
Impacted products: Rational ClearCase, WebSphere AS Traditional.
Severity: 2/4.
Consequences: data reading.
Provenance: intranet client.
Creation date: 27/06/2019.
Identifiers: CVE-2019-4269, ibm10884032, ibm10957573, VIGILANCE-VUL-29636.

Description of the vulnerability

An attacker can bypass access restrictions to data via Admin Console of IBM WebSphere AS, in order to obtain sensitive information.
Full Vigil@nce bulletin... (Free trial)

vulnerability note CVE-2019-4080

WebSphere AS: infinite loop via Admin Console

Synthesis of the vulnerability

An attacker can trigger an infinite loop via Admin Console of WebSphere AS, in order to trigger a denial of service.
Impacted products: Rational ClearCase, Tivoli System Automation, WebSphere AS Traditional.
Severity: 2/4.
Consequences: denial of service on service, denial of service on client.
Provenance: intranet client.
Creation date: 27/03/2019.
Identifiers: CVE-2019-4080, ibm10875692, ibm10880551, ibm10884894, VIGILANCE-VUL-28864.

Description of the vulnerability

An attacker can trigger an infinite loop via Admin Console of WebSphere AS, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

vulnerability CVE-2018-1902

WebSphere AS: privilege escalation via Spoof Connection Information

Synthesis of the vulnerability

An attacker can bypass restrictions via Spoof Connection Information of WebSphere AS, in order to escalate his privileges.
Impacted products: Rational ClearCase, Tivoli Storage Manager, Tivoli System Automation, WebSphere AS Liberty, WebSphere AS Traditional.
Severity: 2/4.
Consequences: privileged access/rights, user access/rights.
Provenance: intranet server.
Creation date: 08/03/2019.
Identifiers: CVE-2018-1902, ibm10795115, ibm10876438, ibm10877000, ibm10884082, swg27048591, VIGILANCE-VUL-28690.

Description of the vulnerability

An attacker can bypass restrictions via Spoof Connection Information of WebSphere AS, in order to escalate his privileges.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability alert CVE-2018-1890

IBM Java: privilege escalation via RPATH

Synthesis of the vulnerability

An attacker can bypass restrictions via RPATH of IBM Java, in order to escalate his privileges.
Impacted products: AIX, IBM API Connect, IBM i, Rational ClearCase, Security Directory Server, Tivoli System Automation, WebSphere AS Liberty, WebSphere AS Traditional, SUSE Linux Enterprise Desktop, SLES.
Severity: 2/4.
Consequences: administrator access/rights, privileged access/rights.
Provenance: user shell.
Creation date: 06/03/2019.
Identifiers: CVE-2018-1890, ibm10873042, ibm10875554, ibm10878234, ibm10878236, ibm10878376, ibm10882598, ibm10883400, ibm10885024, SUSE-SU-2019:0617-1, VIGILANCE-VUL-28666.

Description of the vulnerability

An attacker can bypass restrictions via RPATH of IBM Java, in order to escalate his privileges.
Full Vigil@nce bulletin... (Free trial)

vulnerability alert CVE-2019-4030

WebSphere AS: Cross Site Scripting via Admin Console

Synthesis of the vulnerability

An attacker can trigger a Cross Site Scripting via Admin Console of WebSphere AS, in order to run JavaScript code in the context of the web site.
Impacted products: Rational ClearCase, Tivoli System Automation, WebSphere AS Traditional.
Severity: 2/4.
Consequences: client access/rights.
Provenance: document.
Creation date: 05/03/2019.
Identifiers: CVE-2019-4030, ibm10869406, ibm10876436, ibm10876986, swg27048591, VIGILANCE-VUL-28651.

Description of the vulnerability

The WebSphere AS product offers a web service.

However, it does not filter received data via Admin Console before inserting them in generated HTML documents.

An attacker can therefore trigger a Cross Site Scripting via Admin Console of WebSphere AS, in order to run JavaScript code in the context of the web site.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability note CVE-2018-1996

WebSphere AS: information disclosure via TLS Configuration

Synthesis of the vulnerability

An attacker can bypass access restrictions to data via TLS Configuration of WebSphere AS, in order to obtain sensitive information.
Impacted products: Rational ClearCase, Security Directory Server, Tivoli System Automation, WebSphere AS Traditional.
Severity: 2/4.
Consequences: data reading.
Provenance: internet client.
Creation date: 20/02/2019.
Identifiers: 154650, CVE-2018-1996, ibm10793421, ibm10874404, ibm10876442, ibm10878821, swg27048591, VIGILANCE-VUL-28559.

Description of the vulnerability

An attacker can bypass access restrictions to data via TLS Configuration of WebSphere AS, in order to obtain sensitive information.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability alert CVE-2018-1904

WebSphere AS: code execution via Unserialized Object

Synthesis of the vulnerability

An attacker can use a vulnerability via Unserialized Object of WebSphere AS, in order to run code.
Impacted products: Rational ClearCase, Tivoli System Automation, WebSphere AS Traditional.
Severity: 3/4.
Consequences: privileged access/rights, user access/rights.
Provenance: intranet server.
Creation date: 11/12/2018.
Identifiers: CVE-2018-1904, ibm10738735, ibm10791781, ibm10793333, VIGILANCE-VUL-27996.

Description of the vulnerability

An attacker can use a vulnerability via Unserialized Object of WebSphere AS, in order to run code.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability CVE-2018-1926

WebSphere AS: Cross Site Request Forgery via Admin Console

Synthesis of the vulnerability

An attacker can trigger a Cross Site Request Forgery via Admin Console of WebSphere AS, in order to force the victim to perform operations.
Impacted products: Rational ClearCase, Tivoli System Automation, WebSphere AS Traditional.
Severity: 2/4.
Consequences: user access/rights.
Provenance: internet client.
Creation date: 11/12/2018.
Identifiers: CVE-2018-1926, ibm10742301, ibm10791781, ibm10793329, VIGILANCE-VUL-27995.

Description of the vulnerability

The WebSphere AS product offers a web service.

However, the origin of queries is not checked. They can for example originate from an image included in an HTML document.

An attacker can therefore trigger a Cross Site Request Forgery via Admin Console of WebSphere AS, in order to force the victim to perform operations.
Full Vigil@nce bulletin... (Free trial)

vulnerability note CVE-2018-1901

WebSphere AS: privilege escalation via Cached Value

Synthesis of the vulnerability

An attacker can bypass restrictions via Cached Value of WebSphere AS, in order to escalate his privileges.
Impacted products: Tivoli System Automation, WebSphere AS Liberty, WebSphere AS Traditional.
Severity: 2/4.
Consequences: administrator access/rights, privileged access/rights.
Provenance: intranet client.
Creation date: 11/12/2018.
Identifiers: CVE-2018-1901, ibm10738727, ibm10793335, VIGILANCE-VUL-27994.

Description of the vulnerability

An attacker can bypass restrictions via Cached Value of WebSphere AS, in order to escalate his privileges.
Full Vigil@nce bulletin... (Free trial)
Our database contains other pages. You can request a free trial to read them.

Display information about IBM WebSphere Application Server Traditional: