发布时间 :2001-09-19 00:00:00
修订时间 :2011-03-07 21:06:24

[原文]IBM WebSphere Application Server 3.02 through 3.53 uses predictable session IDs for cookies, which allows remote attackers to gain privileges of WebSphere users via brute force guessing.

[CNNVD]IBM WebSphere Application Server权限漏洞(CNNVD-200109-057)

        IBM WebSphere Application Server 3.02到3.53版本为了cookies使用可预期的访问Ids,远程攻击者可以借助无理性的强迫猜测提升WebSphere用户的权限。

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:ibm:websphere_commerce_suite:3.1.2IBM WebSphere Commerce Suite 3.1.2
cpe:/a:ibm:websphere_commerce_suite:3.2IBM WebSphere Commerce Suite 3.2
cpe:/a:ibm:websphere_application_server:3.5.3IBM WebSphere Application Server 3.5.3

- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(VENDOR_ADVISORY)  XF  ibm-websphere-seq-predict(7153)
(VENDOR_ADVISORY)  BUGTRAQ  20010919 Websphere cookie/sessionid predictable
(UNKNOWN)  BUGTRAQ  20010919 Websphere cookie/sessionid predictable

- 漏洞信息

IBM WebSphere Application Server权限漏洞
高危 未知
2001-09-19 00:00:00 2005-05-02 00:00:00
        IBM WebSphere Application Server 3.02到3.53版本为了cookies使用可预期的访问Ids,远程攻击者可以借助无理性的强迫猜测提升WebSphere用户的权限。

- 公告与补丁


- 漏洞信息

IBM WebSphere Application Server (WAS) Predictable Session Cookies
Remote / Network Access
Loss of Confidentiality, Loss of Integrity
Exploit Public

- 漏洞描述

IBM's WebSphere Application Server contains a flaw that may lead to an unauthorized information disclosure. The issue is triggered when the server issues cookies in a predictable manner, allowing trivial brute force guessing of arbitrary user sessions, resulting in a loss of confidentiality and integrity.

- 时间线

2001-09-19 2001-09-19
2001-09-19 Unknow

- 解决方案

Upgrade to version 4.X or higher, as it has been reported to fix this vulnerability. It is also possible to correct the flaw by implementing the following workaround(s): apply the fix PQ47663V302 available via the Vendor URL

- 相关参考

- 漏洞作者