fkie_cve-2006-2430
Vulnerability from fkie_nvd
Published
2006-05-17 10:06
Modified
2025-04-03 01:03
Severity ?
Summary
IBM WebSphere Application Server 5.0.2 and earlier, 5.1.1 and earlier, and 6.0.2 up to 6.0.2.7 records user credentials in plaintext in addNode.log, which allows attackers to gain privileges.
References
cve@mitre.orghttp://archives.neohapsis.com/archives/bugtraq/2006-05/0175.htmlPatch
cve@mitre.orghttp://secunia.com/advisories/20032Patch, Vendor Advisory
cve@mitre.orghttp://securityreason.com/securityalert/910
cve@mitre.orghttp://www-1.ibm.com/support/docview.wss?rs=0&dc=DB550&q1=PK16492&uid=swg1PK22416&loc=en_US&cs=utf-8&lang=Patch
cve@mitre.orghttp://www-1.ibm.com/support/docview.wss?rs=180&uid=swg24011773Patch
cve@mitre.orghttp://www-1.ibm.com/support/docview.wss?rs=180&uid=swg24012009Patch
cve@mitre.orghttp://www-1.ibm.com/support/docview.wss?rs=180&uid=swg24012064Patch
cve@mitre.orghttp://www-1.ibm.com/support/search.wss?rs=0&q=PK16492&apar=onlyPatch
cve@mitre.orghttp://www.osvdb.org/25372
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/1736
af854a3a-2127-422b-91ae-364da2661108http://archives.neohapsis.com/archives/bugtraq/2006-05/0175.htmlPatch
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20032Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://securityreason.com/securityalert/910
af854a3a-2127-422b-91ae-364da2661108http://www-1.ibm.com/support/docview.wss?rs=0&dc=DB550&q1=PK16492&uid=swg1PK22416&loc=en_US&cs=utf-8&lang=Patch
af854a3a-2127-422b-91ae-364da2661108http://www-1.ibm.com/support/docview.wss?rs=180&uid=swg24011773Patch
af854a3a-2127-422b-91ae-364da2661108http://www-1.ibm.com/support/docview.wss?rs=180&uid=swg24012009Patch
af854a3a-2127-422b-91ae-364da2661108http://www-1.ibm.com/support/docview.wss?rs=180&uid=swg24012064Patch
af854a3a-2127-422b-91ae-364da2661108http://www-1.ibm.com/support/search.wss?rs=0&q=PK16492&apar=onlyPatch
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/25372
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/1736



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ibm:websphere_application_server:5.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "84200300-1985-4770-81E0-31CB2CB99DCB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:websphere_application_server:5.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8873A6A6-D840-48E2-AED2-BB8584E3817A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:websphere_application_server:5.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB3F05B9-6EE1-4838-AD41-7DD329E71E3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:websphere_application_server:5.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "66DB2053-6DFD-4FF6-A6E9-444281531E24",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:websphere_application_server:5.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "31419896-89F7-43A2-8B7C-3B92744BBC46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:websphere_application_server:6.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "714C405D-1E8F-45C1-8A09-5103F0080C76",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:websphere_application_server:6.0.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7F31FD3-8681-4F07-9644-5CC87D512520",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:websphere_application_server:6.0.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2604E01-E43E-4882-8896-5E646E850286",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:websphere_application_server:6.0.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "458BAD79-958E-4665-B1F8-0D46E0C57045",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:websphere_application_server:6.0.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B68EE27-CC4F-4530-9DFE-D94171C45F64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:websphere_application_server:6.0.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC1A723F-D685-4FE5-8938-5682A2D02155",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:websphere_application_server:6.0.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "810E5AEC-5C35-4962-B9BB-32D66290D1D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:websphere_application_server:6.0.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "9643B593-DADF-4F57-B41E-541C7F554A4C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "IBM WebSphere Application Server 5.0.2 and earlier, 5.1.1 and earlier, and 6.0.2 up to 6.0.2.7 records user credentials in plaintext in addNode.log, which allows attackers to gain privileges."
    }
  ],
  "id": "CVE-2006-2430",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": true,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-05-17T10:06:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://archives.neohapsis.com/archives/bugtraq/2006-05/0175.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/20032"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securityreason.com/securityalert/910"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www-1.ibm.com/support/docview.wss?rs=0\u0026dc=DB550\u0026q1=PK16492\u0026uid=swg1PK22416\u0026loc=en_US\u0026cs=utf-8\u0026lang="
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www-1.ibm.com/support/docview.wss?rs=180\u0026uid=swg24011773"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www-1.ibm.com/support/docview.wss?rs=180\u0026uid=swg24012009"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www-1.ibm.com/support/docview.wss?rs=180\u0026uid=swg24012064"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www-1.ibm.com/support/search.wss?rs=0\u0026q=PK16492\u0026apar=only"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/25372"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/1736"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://archives.neohapsis.com/archives/bugtraq/2006-05/0175.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/20032"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/910"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www-1.ibm.com/support/docview.wss?rs=0\u0026dc=DB550\u0026q1=PK16492\u0026uid=swg1PK22416\u0026loc=en_US\u0026cs=utf-8\u0026lang="
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www-1.ibm.com/support/docview.wss?rs=180\u0026uid=swg24011773"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www-1.ibm.com/support/docview.wss?rs=180\u0026uid=swg24012009"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www-1.ibm.com/support/docview.wss?rs=180\u0026uid=swg24012064"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www-1.ibm.com/support/search.wss?rs=0\u0026q=PK16492\u0026apar=only"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/25372"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/1736"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…