First published: Tue Jul 14 2015(Updated: )
IBM WebSphere Application Server (WAS) 8.5 before 8.5.5.6, and WebSphere Virtual Enterprise 7.0 before 7.0.0.6 for WebSphere Application Server (WAS) 7.0 and 8.0, does not properly implement user roles, which allows local users to gain privileges via unspecified vectors.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM WebSphere Application Server with Web Server Plug-ins | =7.0 | |
IBM WebSphere Application Server with Web Server Plug-ins | =8.0.0.0 | |
IBM WebSphere Application Server with Web Server Plug-ins | =8.5.0.0 | |
IBM WebSphere Application Server with Web Server Plug-ins | =8.5.0.1 | |
IBM WebSphere Application Server with Web Server Plug-ins | =8.5.0.2 | |
IBM WebSphere Application Server with Web Server Plug-ins | =8.5.5.0 | |
IBM WebSphere Application Server with Web Server Plug-ins | =8.5.5.1 | |
IBM WebSphere Application Server with Web Server Plug-ins | =8.5.5.2 | |
IBM WebSphere Application Server with Web Server Plug-ins | =8.5.5.3 | |
IBM WebSphere Application Server with Web Server Plug-ins | =8.5.5.4 | |
IBM WebSphere Application Server with Web Server Plug-ins | =8.5.5.5 | |
IBM WebSphere Virtual Enterprise | =7.0 | |
IBM WebSphere Virtual Enterprise | =7.0.0.1 | |
IBM WebSphere Virtual Enterprise | =7.0.0.2 | |
IBM WebSphere Virtual Enterprise | =7.0.0.3 | |
IBM WebSphere Virtual Enterprise | =7.0.0.4 | |
IBM WebSphere Virtual Enterprise | =7.0.0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-1946 has a medium severity rating due to the potential for local users to gain elevated privileges.
To mitigate CVE-2015-1946, upgrade to WebSphere Application Server version 8.5.5.6 or later, or version 7.0.0.6 or later for WebSphere Virtual Enterprise.
CVE-2015-1946 affects IBM WebSphere Application Server versions 7.0, 8.0.0.0, and 8.5.0.0 to 8.5.5.5.
The impacts of CVE-2015-1946 include unauthorized access and modification of system resources due to improper user role implementation.
Yes, CVE-2015-1946 poses a risk to user authentication as it allows local users to gain privileges beyond their intended roles.