wid-sec-w-2024-0906
Vulnerability from csaf_certbund
Published
2024-04-16 22:00
Modified
2024-07-04 22:00
Summary
IBM WebSphere Application Server: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
IBM WebSphere Application Server ist ein J2EE-Applikationsserver.
Angriff
Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter anonymer Angreifer kann mehrere Schwachstellen in IBM WebSphere Application Server ausnutzen, um Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand zu verursachen und vertrauliche Informationen offenzulegen.
Betroffene Betriebssysteme
- Linux
- MacOS X
- Sonstiges
- Windows
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "IBM WebSphere Application Server ist ein J2EE-Applikationsserver.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer aus dem angrenzenden Netzwerk oder ein entfernter anonymer Angreifer kann mehrere Schwachstellen in IBM WebSphere Application Server ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand zu verursachen und vertrauliche Informationen offenzulegen.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- MacOS X\n- Sonstiges\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-0906 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0906.json" }, { "category": "self", "summary": "WID-SEC-2024-0906 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0906" }, { "category": "external", "summary": "IBM Security Bulletin vom 2024-04-16", "url": "https://www.ibm.com/support/pages/node/7148380" }, { "category": "external", "summary": "IBM Security Bulletin vom 2024-04-16", "url": "https://www.ibm.com/support/pages/node/7148426" }, { "category": "external", "summary": "IBM Security Bulletin 7148501 vom 2024-04-17", "url": "https://www.ibm.com/support/pages/node/7148501" }, { "category": "external", "summary": "IBM Security Bulletin 7148751 vom 2024-04-19", "url": "https://www.ibm.com/support/pages/node/7148751" }, { "category": "external", "summary": "IBM Security Bulletin 7148974 vom 2024-04-22", "url": "https://www.ibm.com/support/pages/node/7148974" }, { "category": "external", "summary": "IBM Security Bulletin 7148976 vom 2024-04-22", "url": "https://www.ibm.com/support/pages/node/7148976" }, { "category": "external", "summary": "IBM Security Bulletin 7149055 vom 2024-04-22", "url": "https://www.ibm.com/support/pages/node/7149055" }, { "category": "external", "summary": "IBM Security Bulletin vom 2024-04-26", "url": "https://www.ibm.com/support/pages/node/7149579" }, { "category": "external", "summary": "IBM Security Bulletin 7150669 vom 2024-05-09", "url": "https://www.ibm.com/support/pages/node/7150669" }, { "category": "external", "summary": "IBM Security Bulletin 7155114 vom 2024-05-29", "url": "https://www.ibm.com/support/pages/node/7155114" }, { "category": "external", "summary": "IBM Security Bulletin 7156268 vom 2024-06-03", "url": "https://www.ibm.com/support/pages/node/7156268" }, { "category": "external", "summary": "IBM Security Bulletin 7156265 vom 2024-06-03", "url": "https://www.ibm.com/support/pages/node/7156265" }, { "category": "external", "summary": "IBM Security Bulletin 7145534 vom 2024-06-24", "url": "https://www.ibm.com/support/pages/node/7145534" }, { "category": "external", "summary": "IBM Security Bulletin 7158639 vom 2024-06-25", "url": "https://www.ibm.com/support/pages/node/7158639" }, { "category": "external", "summary": "IBM Security Bulletin 7157976 vom 2024-06-26", "url": "https://www.ibm.com/support/pages/node/7157976" }, { "category": "external", "summary": "IBM Security Bulletin 7158959 vom 2024-06-27", "url": "https://www.ibm.com/support/pages/node/7158959" }, { "category": "external", "summary": "IBM Security Bulletin 7159010 vom 2024-06-27", "url": "https://www.ibm.com/support/pages/node/7159010" }, { "category": "external", "summary": "IBM Security Bulletin 7159670 vom 2024-07-04", "url": "https://www.ibm.com/support/pages/node/7159670" } ], "source_lang": "en-US", "title": "IBM WebSphere Application Server: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-07-04T22:00:00.000+00:00", "generator": { "date": "2024-07-05T08:03:51.507+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2024-0906", "initial_release_date": "2024-04-16T22:00:00.000+00:00", "revision_history": [ { "date": "2024-04-16T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-04-17T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2024-04-18T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2024-04-21T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2024-04-22T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2024-04-25T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2024-05-09T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2024-05-28T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2024-06-02T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2024-06-24T22:00:00.000+00:00", "number": "10", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2024-06-26T22:00:00.000+00:00", "number": "11", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2024-06-27T22:00:00.000+00:00", "number": "12", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2024-07-04T22:00:00.000+00:00", "number": "13", "summary": "Neue Updates von IBM aufgenommen" } ], "status": "final", "version": "13" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "IBM Business Automation Workflow", "product": { "name": "IBM Business Automation Workflow", "product_id": "T019704", "product_identification_helper": { "cpe": "cpe:/a:ibm:business_automation_workflow:-" } } }, { "category": "product_name", "name": "IBM Business Automation Workflow", "product": { "name": "IBM Business Automation Workflow", "product_id": "T024465", "product_identification_helper": { "cpe": "cpe:/a:ibm:business_automation_workflow:traditional" } } } ], "category": "product_name", "name": "Business Automation Workflow" }, { "branches": [ { "category": "product_version", "name": "10.0.0.0", "product": { "name": "IBM InfoSphere Identity Insight 10.0.0.0", "product_id": "T033658", "product_identification_helper": { "cpe": "cpe:/a:ibm:infosphere_identity_insight:10.0.0.0" } } }, { "category": "product_version", "name": "9.0.0.1", "product": { "name": "IBM InfoSphere Identity Insight 9.0.0.1", "product_id": "T035627", "product_identification_helper": { "cpe": "cpe:/a:ibm:infosphere_identity_insight:9.0.0.1" } } } ], "category": "product_name", "name": "InfoSphere Identity Insight" }, { "branches": [ { "category": "product_version", "name": "9.2", "product": { "name": "IBM License Metric Tool 9.2", "product_id": "T031605", "product_identification_helper": { "cpe": "cpe:/a:ibm:license_metric_tool:9.2" } } } ], "category": "product_name", "name": "License Metric Tool" }, { "branches": [ { "category": "product_version", "name": "9.1.0", "product": { "name": "IBM MQ 9.1.0", "product_id": "T021105", "product_identification_helper": { "cpe": "cpe:/a:ibm:mq:9.1.0" } } }, { "category": "product_version", "name": "9.2.0", "product": { "name": "IBM MQ 9.2.0", "product_id": "T021106", "product_identification_helper": { "cpe": "cpe:/a:ibm:mq:9.2.0" } } }, { "category": "product_version", "name": "9.3.0", "product": { "name": "IBM MQ 9.3.0", "product_id": "T026459", "product_identification_helper": { "cpe": "cpe:/a:ibm:mq:9.3.0" } } } ], "category": "product_name", "name": "MQ" }, { "branches": [ { "category": "product_name", "name": "IBM Rational ClearCase", "product": { "name": "IBM Rational ClearCase", "product_id": "T004180", "product_identification_helper": { "cpe": "cpe:/a:ibm:rational_clearcase:-" } } }, { "category": "product_version", "name": "9.1", "product": { "name": "IBM Rational ClearCase 9.1", "product_id": "T021423", "product_identification_helper": { "cpe": "cpe:/a:ibm:rational_clearcase:9.1" } } }, { "category": "product_version", "name": "10.0.0", "product": { "name": "IBM Rational ClearCase 10.0.0", "product_id": "T026520", "product_identification_helper": { "cpe": "cpe:/a:ibm:rational_clearcase:10.0.0" } } } ], "category": "product_name", "name": "Rational ClearCase" }, { "category": "product_name", "name": "IBM Rational ClearQuest", "product": { "name": "IBM Rational ClearQuest", "product_id": "5168", "product_identification_helper": { "cpe": "cpe:/a:ibm:rational_clearquest:-" } } }, { "branches": [ { "category": "product_version", "name": "for Multiplatforms 9.1", "product": { "name": "IBM TXSeries for Multiplatforms 9.1", "product_id": "T015903", "product_identification_helper": { "cpe": "cpe:/a:ibm:txseries:for_multiplatforms_9.1" } } }, { "category": "product_version", "name": "for Multiplatforms 8.2", "product": { "name": "IBM TXSeries for Multiplatforms 8.2", "product_id": "T015904", "product_identification_helper": { "cpe": "cpe:/a:ibm:txseries:for_multiplatforms_8.2" } } }, { "category": "product_version", "name": "for Multiplatforms 8.1", "product": { "name": "IBM TXSeries for Multiplatforms 8.1", "product_id": "T015905", "product_identification_helper": { "cpe": "cpe:/a:ibm:txseries:for_multiplatforms_8.1" } } } ], "category": "product_name", "name": "TXSeries" }, { "category": "product_name", "name": "IBM Tivoli Key Lifecycle Manager", "product": { "name": "IBM Tivoli Key Lifecycle Manager", "product_id": "T026238", "product_identification_helper": { "cpe": "cpe:/a:ibm:tivoli_key_lifecycle_manager:-" } } }, { "branches": [ { "category": "product_version", "name": "6.3.0.7", "product": { "name": "IBM Tivoli Monitoring 6.3.0.7", "product_id": "342008", "product_identification_helper": { "cpe": "cpe:/a:ibm:tivoli_monitoring:6.3.0.7" } } } ], "category": "product_name", "name": "Tivoli Monitoring" }, { "branches": [ { "category": "product_version", "name": "8.5", "product": { "name": "IBM WebSphere Application Server 8.5", "product_id": "703851", "product_identification_helper": { "cpe": "cpe:/a:ibm:websphere_application_server:8.5" } } }, { "category": "product_version", "name": "9", "product": { "name": "IBM WebSphere Application Server 9.0", "product_id": "703852", "product_identification_helper": { "cpe": "cpe:/a:ibm:websphere_application_server:9.0" } } }, { "category": "product_version_range", "name": "Liberty \u003c=24.0.0.3", "product": { "name": "IBM WebSphere Application Server Liberty \u003c=24.0.0.3", "product_id": "T034275", "product_identification_helper": { "cpe": "cpe:/a:ibm:websphere_application_server:liberty__24.0.0.3" } } } ], "category": "product_name", "name": "WebSphere Application Server" }, { "branches": [ { "category": "product_version", "name": "8.5", "product": { "name": "IBM WebSphere Service Registry and Repository 8.5", "product_id": "306235", "product_identification_helper": { "cpe": "cpe:/a:ibm:websphere_service_registry_and_repository:8.5" } } } ], "category": "product_name", "name": "WebSphere Service Registry and Repository" } ], "category": "vendor", "name": "IBM" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-22329", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in IBM WebSphere Application Server. Der Fehler besteht aufgrund einer serverseitigen Request Forgery. Ein Angreifer aus dem angrenzenden Netzwerk kann diese Schwachstelle ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen." } ], "product_status": { "known_affected": [ "T015905", "T015904", "T015903", "5168", "T035627", "T033658", "703851", "703852", "T021105", "T021423", "T026459", "T019704", "T021106", "T024465", "T031605", "T004180", "T026238", "342008", "T026520", "306235" ], "last_affected": [ "T034275" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2024-22329" }, { "cve": "CVE-2024-22354", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in IBM WebSphere Application Server. Der Fehler besteht aufgrund eines XML External Entity Injection (XXE)-Angriffs bei der Verarbeitung von XML-Daten. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um vertrauliche Informationen offenzulegen, Speicherressourcen zu verbrauchen oder einen serverseitigen Request Forgery-Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T015905", "T015904", "T015903", "5168", "T035627", "T033658", "703851", "703852", "T021105", "T021423", "T026459", "T019704", "T021106", "T024465", "T031605", "T004180", "T026238", "342008", "T026520", "306235" ], "last_affected": [ "T034275" ] }, "release_date": "2024-04-16T22:00:00Z", "title": "CVE-2024-22354" } ] }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.