First published: Mon Apr 27 2015(Updated: )
WebSphereOauth20SP.ear in IBM WebSphere Application Server (WAS) 7.0 before 7.0.0.39, 8.0 before 8.0.0.11, 8.5 Liberty Profile before 8.5.5.5, and 8.5 Full Profile before 8.5.5.6, when the OAuth grant type requires sending a password, allows remote attackers to gain privileges via unspecified vectors.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM WebSphere Application Server Feature Pack for Web Services | =7.0 | |
IBM WebSphere Application Server Feature Pack for Web Services | =7.0.0.1 | |
IBM WebSphere Application Server Feature Pack for Web Services | =7.0.0.2 | |
IBM WebSphere Application Server Feature Pack for Web Services | =7.0.0.3 | |
IBM WebSphere Application Server Feature Pack for Web Services | =7.0.0.10 | |
IBM WebSphere Application Server Feature Pack for Web Services | =7.0.0.11 | |
IBM WebSphere Application Server Feature Pack for Web Services | =7.0.0.12 | |
IBM WebSphere Application Server Feature Pack for Web Services | =7.0.0.13 | |
IBM WebSphere Application Server Feature Pack for Web Services | =7.0.0.14 | |
IBM WebSphere Application Server Feature Pack for Web Services | =7.0.0.15 | |
IBM WebSphere Application Server Feature Pack for Web Services | =7.0.0.16 | |
IBM WebSphere Application Server Feature Pack for Web Services | =7.0.0.17 | |
IBM WebSphere Application Server Feature Pack for Web Services | =7.0.0.18 | |
IBM WebSphere Application Server Feature Pack for Web Services | =7.0.0.19 | |
IBM WebSphere Application Server Feature Pack for Web Services | =7.0.0.21 | |
IBM WebSphere Application Server Feature Pack for Web Services | =7.0.0.22 | |
IBM WebSphere Application Server Feature Pack for Web Services | =7.0.0.23 | |
IBM WebSphere Application Server Feature Pack for Web Services | =7.0.0.24 | |
IBM WebSphere Application Server Feature Pack for Web Services | =7.0.0.25 | |
IBM WebSphere Application Server Feature Pack for Web Services | =7.0.0.27 | |
IBM WebSphere Application Server Feature Pack for Web Services | =7.0.0.29 | |
IBM WebSphere Application Server Feature Pack for Web Services | =7.0.0.31 | |
IBM WebSphere Application Server Feature Pack for Web Services | =7.0.0.32 | |
IBM WebSphere Application Server Feature Pack for Web Services | =7.0.0.33 | |
IBM WebSphere Application Server Feature Pack for Web Services | =7.0.0.34 | |
IBM WebSphere Application Server Feature Pack for Web Services | =7.0.0.35 | |
IBM WebSphere Application Server Feature Pack for Web Services | =7.0.0.36 | |
IBM WebSphere Application Server Feature Pack for Web Services | =7.0.0.37 | |
IBM WebSphere Application Server Feature Pack for Web Services | =7.0.0.38 | |
IBM WebSphere Application Server Feature Pack for Web Services | =8.5.0.0 | |
IBM WebSphere Application Server Feature Pack for Web Services | =8.5.0.1 | |
IBM WebSphere Application Server Feature Pack for Web Services | =8.5.0.2 | |
IBM WebSphere Application Server Feature Pack for Web Services | =8.5.5.0 | |
IBM WebSphere Application Server Feature Pack for Web Services | =8.5.5.1 | |
IBM WebSphere Application Server Feature Pack for Web Services | =8.5.5.2 | |
IBM WebSphere Application Server Feature Pack for Web Services | =8.5.5.3 | |
IBM WebSphere Application Server Feature Pack for Web Services | =8.5.5.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-1885 has been classified with a medium severity due to potential unauthorized access and privilege escalation risks.
To mitigate CVE-2015-1885, update IBM WebSphere Application Server to version 7.0.0.39 or later, 8.0.0.11 or later, 8.5 Liberty Profile to 8.5.5.5 or later, and Full Profile to 8.5.5.6 or later.
CVE-2015-1885 affects WebSphere Application Server versions 7.0, 8.0, and 8.5 prior to certain patch levels.
Yes, CVE-2015-1885 allows remote attackers to potentially exploit the vulnerability to gain unauthorized privileges.
Yes, IBM has released patches to address CVE-2015-1885 as part of their software version updates.