fkie_cve-2009-0903
Vulnerability from fkie_nvd
Published
2009-06-25 01:30
Modified
2025-04-09 00:30
Severity ?
Summary
IBM WebSphere Application Server (WAS) 7.0 before 7.0.0.3, and the Feature Pack for Web Services for WAS 6.1 before 6.1.0.25, when a WS-Security policy is established at the operation level, does not properly handle inbound requests that lack a SOAPAction or WS-Addressing Action, which allows remote attackers to bypass intended access restrictions via a crafted request to a JAX-WS application.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ibm:websphere_application_server:6.1:*:*:*:*:*:*:*", "matchCriteriaId": "7B9CDD56-921C-4FAF-87E2-14B91EC1A93D", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:6.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "95255265-6D69-46D3-9FFA-8EDB1734375C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:6.1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "2E4191D3-64AB-482C-9DEF-DD04C4C942CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:6.1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "5FC6EB31-9707-408B-8BF5-66BD23441A75", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:6.1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "9B73E052-AF4F-4543-AA03-F5B1FA976EA8", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:6.1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "23171B81-C991-467A-95A4-EDDAC59C37BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:6.1.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "CBD75308-7F21-4DDF-AD66-C155CF4B721B", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:6.1.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "2586C584-3258-414B-AB28-1EBA0DBD0B83", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:6.1.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "431C250D-8279-4071-871C-1C7C4DE09B5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:6.1.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "BCA175EA-EDC6-4228-8E28-E9BBC981E60A", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:6.1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "FC300B03-7A8F-4E96-B55D-18CC258BBFCF", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:6.1.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "C6A4EC9D-98C2-40B0-BA40-4838FE8D1FF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:6.1.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "D3A3ADFB-93E0-42E5-B31B-59F22EA4E3EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:6.1.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "7AF5BB33-4E78-4123-8093-EBEE2F2B5598", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:6.1.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "E3F4B8EA-9299-42C1-AAFB-831701ED2FA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:6.1.0.13:*:*:*:*:*:*:*", "matchCriteriaId": "A45B6F32-5DFF-4833-9F0F-89576724CF97", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:6.1.0.14:*:*:*:*:*:*:*", "matchCriteriaId": "13C8054A-8581-4936-AF94-291AE56EB4DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:6.1.0.15:*:*:*:*:*:*:*", "matchCriteriaId": "13CA9A59-DFE4-4566-8719-E6FA4720F06A", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:6.1.0.16:*:*:*:*:*:*:*", "matchCriteriaId": "026EBFCD-0BC1-404B-BC14-292F35BE667A", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:6.1.0.17:*:*:*:*:*:*:*", "matchCriteriaId": "A89DD1BF-4AB0-480D-9856-B1BEA73A4AAD", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:6.1.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "B13D74F8-4321-48B3-A33E-FCCFA93013CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:6.1.0.19:*:*:*:*:*:*:*", "matchCriteriaId": "49E119EF-B6A5-4B6C-B199-C64F62CA7CB2", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:6.1.0.20:*:*:*:*:*:*:*", "matchCriteriaId": "2043B836-3950-46A1-89E4-08985DEA0D33", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:6.1.0.21:*:*:*:*:*:*:*", "matchCriteriaId": "C9C8FA3D-9162-4D9B-8250-FAC93ED77A2D", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:6.1.0.22:*:*:*:*:*:*:*", "matchCriteriaId": "5EE93B7F-3EB5-4BE4-BFAA-4AA30D15A76D", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:6.1.0.23:*:*:*:*:*:*:*", "matchCriteriaId": "E06DE5D4-D3A5-4783-ACE0-A80808DB09C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:6.1.0.24:*:*:*:*:*:*:*", "matchCriteriaId": "2B009FD6-9352-4329-B67A-8155FB379889", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "B0905C80-A1BA-49CD-90CA-9270ECC3940C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:7.0.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "B108457A-50DC-4432-9E30-98ADBEBF2389", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM WebSphere Application Server (WAS) 7.0 before 7.0.0.3, and the Feature Pack for Web Services for WAS 6.1 before 6.1.0.25, when a WS-Security policy is established at the operation level, does not properly handle inbound requests that lack a SOAPAction or WS-Addressing Action, which allows remote attackers to bypass intended access restrictions via a crafted request to a JAX-WS application." }, { "lang": "es", "value": "IBM WebSphere Application Server (WAS) v7.0 anterior a v7.0.0.3, y el Pack de caracter\u00edsticas para Web Services para WAS v6.1 anterior a v6.1.0.25, cuando una pol\u00edtica WS-Security est\u00e1 establecida en el nivel de operaci\u00f3n, no maneja adecuadamente peticiones de entrada que carecen de una acci\u00f3n SOAPAction o WS-Addressing, lo que permite a atacantes remotos saltar las restricciones de acceso previstas a trav\u00e9s de una petici\u00f3n manipulada para una aplicaci\u00f3n JAX-WS." } ], "id": "CVE-2009-0903", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-06-25T01:30:01.640", "references": [ { "source": "cve@mitre.org", "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1PK72138" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1PK81944" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1PK87767" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/35594" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51293" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1PK72138" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1PK81944" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1PK87767" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/35594" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51293" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…