Security Bulletin
Summary
Cross reference list for security vulnerabilites fixed in IBM WebSphere Application Server, IBM WebSphere Application Server Hypervisor, WebSphere Application Server Liberty Profile and IBM HTTP Server.
Vulnerability Details
CVEID: CVE-2015-1936
DESCRIPTION: IBM WebSphere Application Server Administrative console could allow a remote authenticated attacker to hijack a user's session when Security is not enabled. An attacker could exploit this vulnerability using the JSESSIONID parameter to gain access to another user's session.
CVSS Base Score: 4
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/103108 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:L/Au:S/C:P/I:N/A:N)
AFFECTED VERSIONS: The following IBM WebSphere Application Server Versions are affected:
Remediation/Fixes: The recommended solution is to apply the Fix Pack or PTF for each named product as soon as practical.
Fix:
Apply an Interim Fix , Fix Pack or PTF containing this APAR PI37230, as noted below:
For IBM WebSphere Application Server and IBM WebSphere Application Server Hypervisor Edition:
For V8.5.0.0 through 8.5.5.5:
-- OR
For V8.0.0.0 through 8.0.0.11:
-- OR
Workaround(s): None known
Mitigation(s): None known
Refer to Security bulletins already published:
PI42928 Security bulletin for IBM HTTP Server HTTP request smuggling
PI44793 Security bulletin for IBM HTTP Server Stack Buffer overflow
PI44809 Security bulletin for IBM HTTP Server Denial of Service
PI45266 HTTP Response splitting attack in WebSphere Application Server
PI45596 Security bulletin for IBM HTTP Server Denial of Service
PI49272 Cross-site scripting vulnerability in IBM WebSphere Application Server
PI50993 Apache HTTPComponents vulnerabilities in IBM WebSphere Application Server
PI52103 Vulnerability in Apache Commons affects IBM WebSphere Application Server
PI52395 Vulnerabilities in GSKIT component used by IBM HTTP Server
Get Notified about Future Security Bulletins
Important Note
IBM strongly suggests that all System z customers be subscribed to the System z Security Portal to receive the latest critical System z security and integrity service. If you are not subscribed, see the instructions on the System z Security web site. Security and integrity APARs and associated fixes will be posted to this portal. IBM suggests reviewing the CVSS scores and applying all security or integrity fixes as soon as possible to minimize any potential risk.
References
Change History
01 Februrary 2016: original document published
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
Disclaimer
Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.
Was this topic helpful?
Document Information
Modified date:
15 June 2018
UID
swg21975042