Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2011-0679 |
CWE-ID | CWE-200 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
WebSphere Portal Server applications / Application servers |
Vendor | IBM Corporation |
Security Bulletin
This security bulletin contains one medium risk vulnerability.
EUVDB-ID: #VU45402
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2011-0679
CWE-ID:
CWE-200 - Exposure of sensitive information to an unauthorized actor
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.
IBM WebSphere Portal 6.0.1.1 through 7.0.0.0, as used in IBM Lotus Web Content Management (WCM) and IBM Lotus Quickr for WebSphere Portal, allows remote attackers to obtain sensitive information via a "modified message."
MitigationInstall update from vendor's website.
Vulnerable software versionsWebSphere Portal: 6.0.1.1 - 7.0.0.0
CPE2.3https://osvdb.org/70688
https://secunia.com/advisories/43081
https://www.ibm.com/support/docview.wss?uid=swg21460422
https://www.kb.cert.org/vuls/id/375127
https://www.securityfocus.com/bid/45989
https://www.vupen.com/english/advisories/2011/0223
https://www-01.ibm.com/support/docview.wss?uid=swg1PM22159
https://www-01.ibm.com/support/docview.wss?uid=swg1PM22167
https://www-01.ibm.com/support/docview.wss?uid=swg1PM24319
https://www-01.ibm.com/support/docview.wss?uid=swg1PM24320
https://www-01.ibm.com/support/docview.wss?uid=swg1PM25191
https://www-01.ibm.com/support/docview.wss?uid=swg1PM25698
https://www-01.ibm.com/support/docview.wss?uid=swg1PM26397
https://exchange.xforce.ibmcloud.com/vulnerabilities/64890
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.