Incorrect setting for serveServletsbyClassname could allow a remote attacker on WebSphere Application Server to gain elevated privileges on the system for FTM for Check Services and FTM for Corporate Payment Services
DESCRIPTION: IBM WebSphere Application Server could allow a remote attacker to gain elevated privileges on the system, caused by an application not having the correct serveServletsbyClassname setting. By a developer not setting the correct property, an attacker could exploit this vulnerability to gain unauthorized access.
CVSS Base Score: 6.8
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/102872 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:P)
Affected Products and Versions
- FTM for Check v22.214.171.124
- FTM for CPS v126.96.36.199
|FTM for Check Services||188.8.131.52||PI46336||Apply 2.1.1-FTM-CHECK-MP-fp0009 or later.|
|FTM for Corporate Payment Services||184.108.40.206||PI41632||Apply 2.1.1-FTM-CPS-MP-fp0001 or later|
Workarounds and Mitigations
This has been fixed in WebSphere Application Server - refer to security bulletin http://www.ibm.com/support/docview.wss?uid=swg21959083
Get Notified about Future Security Bulletins
07 August 2015: Original version published
12 August 2015: Updated for final product fixes
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES ""AS IS"" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.
16 June 2018