Vulnerability Description
IBM WebSphere Process Server (WPS) 6.1.2 before 6.1.2.3 and 6.2 before 6.2.0.1 does not properly restrict configuration data during an export of the cluster configuration file from the administrative console, which allows remote authenticated users to obtain the (1) JMSAPI, (2) ESCALATION, and (3) MAILSESSION (aka mail session) cleartext passwords via vectors involving access to a cluster member.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ibm | Websphere Process Server | <= 6.1.2.2 |
Related Weaknesses (CWE)
References
- http://secunia.com/advisories/34249
- http://www-01.ibm.com/support/docview.wss?uid=swg27015580
- http://www-1.ibm.com/support/docview.wss?uid=swg1JR30088Vendor Advisory
- http://www.vupen.com/english/advisories/2009/0670
- https://exchange.xforce.ibmcloud.com/vulnerabilities/48892
- http://secunia.com/advisories/34249
- http://www-01.ibm.com/support/docview.wss?uid=swg27015580
- http://www-1.ibm.com/support/docview.wss?uid=swg1JR30088Vendor Advisory
- http://www.vupen.com/english/advisories/2009/0670
- https://exchange.xforce.ibmcloud.com/vulnerabilities/48892
FAQ
What is CVE-2009-0507?
CVE-2009-0507 is a vulnerability with a CVSS score of 4.0 (MEDIUM). IBM WebSphere Process Server (WPS) 6.1.2 before 6.1.2.3 and 6.2 before 6.2.0.1 does not properly restrict configuration data during an export of the cluster configuration file from the administrative ...
How severe is CVE-2009-0507?
CVE-2009-0507 has been rated MEDIUM with a CVSS base score of 4.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2009-0507?
Check the references section above for vendor advisories and patch information. Affected products include: Ibm Websphere Process Server.