First published: Fri Jul 06 2018(Updated: )
IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 could allow a local attacker to obtain clear text password in a trace file caused by improper handling of some datasource custom properties. IBM X-Force ID: 144346.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM WebSphere Application Server | =7.0.0.0 | |
IBM WebSphere Application Server | =8.0.0.0 | |
IBM WebSphere Application Server | =8.5.0.0 | |
IBM WebSphere Application Server | =9.0.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1621 is rated as a medium severity vulnerability due to the potential exposure of sensitive information.
To mitigate CVE-2018-1621, update your IBM WebSphere Application Server to a patched version that addresses the handling of datasource custom properties.
CVE-2018-1621 affects local users of IBM WebSphere Application Server versions 7.0, 8.0, 8.5, and 9.0 who can access trace files.
CVE-2018-1621 can be exploited by local attackers who gain access to trace files to obtain clear text passwords.
As a temporary workaround for CVE-2018-1621, restrict access to trace files and review datasource configurations to limit exposure.