Risk | Low |
Patch available | YES |
Number of vulnerabilities | 2 |
CVE-ID | CVE-2017-1583 CVE-2011-4343 |
CWE-ID | CWE-388 CWE-200 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software Subscribe |
IBM WebSphere Application Server Server applications / Application servers |
Vendor | IBM Corporation |
Security Bulletin
This security bulletin contains information about 2 vulnerabilities.
EUVDB-ID: #VU9017
Risk: Low
CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2017-1583
CWE-ID:
CWE-388 - Error Handling
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to obtain sensitive information.
The weakness exists due to improper error handling by MyFaces in JSF. A remote attacker can read arbitrary data on the target system.
Update to version 8.0.0.15 or 8.5.5.13.
Vulnerable software versionsIBM WebSphere Application Server: 8.0.0.0 - 8.5.5.12
External linkshttp://www-01.ibm.com/support/docview.wss?uid=swg22008707
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU9019
Risk: Low
CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2011-4343
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to obtain sensitive information.
The weakness exists due to an error in Apache MyFaces. A remote attacker can use specially crafted parameters to inject EL expressions into input fields mapped as view parameters and obtain sensitive information.
Update to version 8.0.0.15 or 8.5.5.13.
Vulnerable software versionsIBM WebSphere Application Server: 8.0.0.0 - 8.5.5.12
External linkshttp://www-01.ibm.com/support/docview.wss?uid=swg22008707
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.