First published: Thu Feb 26 2009(Updated: )
IBM WebSphere Process Server (WPS) 6.1.2 before 6.1.2.3 and 6.2 before 6.2.0.1 does not properly restrict configuration data during an export of the cluster configuration file from the administrative console, which allows remote authenticated users to obtain the (1) JMSAPI, (2) ESCALATION, and (3) MAILSESSION (aka mail session) cleartext passwords via vectors involving access to a cluster member.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ibm Websphere Process Server | =6.1.2 | |
Ibm Websphere Process Server | <=6.1.2.2 | |
Ibm Websphere Process Server | =6.1.2.1 | |
Ibm Websphere Process Server | <=6.2 | |
IBM WebSphere Process Server | <=6.1.2.2 | |
IBM WebSphere Process Server | <=6.2 | |
IBM WebSphere Process Server | =6.1.2 | |
IBM WebSphere Process Server | =6.1.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-0507 is considered a moderate severity vulnerability due to its potential for unauthorized access to sensitive configuration data.
To fix CVE-2009-0507, you should upgrade IBM WebSphere Process Server to version 6.1.2.3 or 6.2.0.1 or later.
CVE-2009-0507 affects IBM WebSphere Process Server versions 6.1.2, 6.1.2.1, and all versions up to 6.2 inclusive.
CVE-2009-0507 allows remote authenticated users to export sensitive configuration data that may include JMSAPI and other components.
No, CVE-2009-0507 requires remote authenticated access in order to exploit the vulnerability.