First published: Thu Feb 26 2009(Updated: )
IBM WebSphere Process Server (WPS) 6.1.2 before 6.1.2.3 and 6.2 before 6.2.0.1 does not properly restrict configuration data during an export of the cluster configuration file from the administrative console, which allows remote authenticated users to obtain the (1) JMSAPI, (2) ESCALATION, and (3) MAILSESSION (aka mail session) cleartext passwords via vectors involving access to a cluster member.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ibm Websphere Process Server | =6.1.2 | |
Ibm Websphere Process Server | <=6.1.2.2 | |
Ibm Websphere Process Server | =6.1.2.1 | |
Ibm Websphere Process Server | <=6.2 | |
IBM WebSphere Process Server | <=6.1.2.2 | |
IBM WebSphere Process Server | <=6.2 | |
IBM WebSphere Process Server | =6.1.2 | |
IBM WebSphere Process Server | =6.1.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.