fkie_cve-2009-1899
Vulnerability from fkie_nvd
Published
2009-06-03 17:00
Modified
2025-04-09 00:30
Severity ?
Summary
Unspecified vulnerability in the Administrative Configservice API in the System Management/Repository component in IBM WebSphere Application Server (WAS) 6.0.2 before 6.0.2.35, 6.1 before 6.1.0.25, and 7.0 before 7.0.0.5 on z/OS allows remote authenticated users to obtain sensitive information via unknown use of the wsadmin scripting tool, related to a "security exposure in wsadmin."
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ibm:websphere_application_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "37136805-596C-4FE4-896C-15FFF1E109D8", "versionEndIncluding": "6.0.2.33", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:6.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "714C405D-1E8F-45C1-8A09-5103F0080C76", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:6.0.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "C7F31FD3-8681-4F07-9644-5CC87D512520", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:6.0.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "C2604E01-E43E-4882-8896-5E646E850286", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:6.0.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "458BAD79-958E-4665-B1F8-0D46E0C57045", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:6.0.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "0B68EE27-CC4F-4530-9DFE-D94171C45F64", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:6.0.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "AC1A723F-D685-4FE5-8938-5682A2D02155", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:6.0.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "810E5AEC-5C35-4962-B9BB-32D66290D1D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:6.0.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "9643B593-DADF-4F57-B41E-541C7F554A4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:6.0.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "1CEBF289-F630-4386-8F79-5A1BF73BE6F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:6.0.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "521DB050-3C94-49BF-8666-6EC2C358AA27", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:6.0.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "A98E5593-1534-48E2-8CD5-B2D1CACDDAB8", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:6.0.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "DB4AB6BD-4439-4100-A3CE-4600AED10B65", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:6.0.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "FD71D5EA-9AF5-422C-810A-D136A5F132F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:6.0.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "375DF4AF-3C7C-47C3-BBB8-AF2B3827AC13", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:6.0.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "2C9D6BDA-39E1-4D15-9D86-E212809998FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:6.0.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "91CC2DA7-BAA6-4061-8D0C-81F002DEF06D", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:6.0.2.16:*:*:*:*:*:*:*", "matchCriteriaId": "4F2A78FE-8FA6-4532-9E9E-CF6F860EFAE9", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:6.0.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "59BEDD70-B6DB-448F-A998-3E8774B0DB8C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:6.0.2.18:*:*:*:*:*:*:*", "matchCriteriaId": "63099EF9-0512-44CD-946A-9B25144E50D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:6.0.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "F200042C-D45E-4CAD-BF6E-E3DADF4D1D21", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:6.0.2.20:*:*:*:*:*:*:*", "matchCriteriaId": "D9132BB1-5E2E-4CA6-9B63-027CF2A7229D", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:6.0.2.21:*:*:*:*:*:*:*", "matchCriteriaId": "D839EDB9-A44F-4F7F-94EF-1A77371D705C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:6.0.2.22:*:*:*:*:*:*:*", "matchCriteriaId": "4421929D-C4B9-43C5-BE61-E68484D3B198", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:6.0.2.23:*:*:*:*:*:*:*", "matchCriteriaId": "EB622117-C91F-47D2-9832-B7DB340796E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:6.0.2.24:*:*:*:*:*:*:*", "matchCriteriaId": "0D65E0CC-FA8C-41FD-B256-47DB0C9757FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:6.0.2.25:*:*:*:*:*:*:*", "matchCriteriaId": "6D87691D-0719-4447-B258-5FA2BD10F11A", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:6.0.2.27:*:*:*:*:*:*:*", "matchCriteriaId": "A5827DEC-ED8A-48D9-8C27-3B49D720E7B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:6.0.2.28:*:*:*:*:*:*:*", "matchCriteriaId": "4D0B1A00-191D-49B2-8841-FB6C48A5D0C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:6.0.2.29:*:*:*:*:*:*:*", "matchCriteriaId": "BF771E28-65AC-4A94-8A51-4EA77BC3D0B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:6.0.2.30:*:*:*:*:*:*:*", "matchCriteriaId": "E5594891-E790-44E7-BC9E-0A413B385E1B", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:6.0.2.31:*:*:*:*:*:*:*", "matchCriteriaId": "C286007A-361F-47BB-A099-E041D5CF6E48", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:websphere_application_server:6.0.2.32:*:*:*:*:*:*:*", "matchCriteriaId": "CD464F13-942D-40EC-8144-6D23A0AEAA81", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in the Administrative Configservice API in the System Management/Repository component in IBM WebSphere Application Server (WAS) 6.0.2 before 6.0.2.35, 6.1 before 6.1.0.25, and 7.0 before 7.0.0.5 on z/OS allows remote authenticated users to obtain sensitive information via unknown use of the wsadmin scripting tool, related to a \"security exposure in wsadmin.\"" }, { "lang": "es", "value": "Vulnerabilidad sin especificar en el componente Management/Repository en IBM WebSphere Application Server (WAS) v6.0.2 anterior a 6.0.2.35 tiene un impacto y vectores de ataque desconocidos. Relacionado con \"exposici\u00f3n de seguridad en wsadmin\"." } ], "id": "CVE-2009-1899", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2009-06-03T17:00:00.627", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/35301" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg27006876" }, { "source": "cve@mitre.org", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg27007951" }, { "source": "cve@mitre.org", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg27014463" }, { "source": "cve@mitre.org", "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1PK77495" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/35405" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/1464" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51172" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/52075" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/35301" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg27006876" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg27007951" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg27014463" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www-1.ibm.com/support/docview.wss?uid=swg1PK77495" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/35405" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/1464" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51172" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/52075" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…