First published: Wed Dec 24 2014(Updated: )
Multiple directory traversal vulnerabilities in the ServiceRegistry UI in IBM WebSphere Service Registry and Repository (WSRR) 7.5.x through 7.5.0.4, 8.0.x before 8.0.0.3, and 8.5.x before 8.5.0.1 allow remote authenticated users to read arbitrary files via unspecified vectors.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM WebSphere Service Registry and Repository | =7.5.0.0 | |
IBM WebSphere Service Registry and Repository | =7.5.0.1 | |
IBM WebSphere Service Registry and Repository | =7.5.0.2 | |
IBM WebSphere Service Registry and Repository | =7.5.0.3 | |
IBM WebSphere Service Registry and Repository | =7.5.0.4 | |
IBM WebSphere Service Registry and Repository | =8.0 | |
IBM WebSphere Service Registry and Repository | =8.0.0.1 | |
IBM WebSphere Service Registry and Repository | =8.0.0.2 | |
IBM WebSphere Service Registry and Repository | =8.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-6155 is considered a high severity vulnerability due to its ability to allow remote authenticated users to access arbitrary files.
To mitigate CVE-2014-6155, upgrade your IBM WebSphere Service Registry and Repository to a patched version 8.0.0.3 or later, or 8.5.0.1 or later.
CVE-2014-6155 affects versions 7.5.x through 7.5.0.4, all 8.0.x versions prior to 8.0.0.3, and all 8.5.x versions prior to 8.5.0.1.
No, CVE-2014-6155 can only be exploited by authenticated users of the IBM WebSphere Service Registry and Repository.
To secure systems against CVE-2014-6155, ensure that your software is updated to the latest secure version and monitor for unauthorized access attempts.