5.5
CVE-2009-0891
- EPSS 0.42%
- Veröffentlicht 25.03.2009 01:30:00
- Zuletzt bearbeitet 09.04.2025 00:30:58
- Quelle cve@mitre.org
- Teams Watchlist Login
- Unerledigt Login
The Web Services Security component in IBM WebSphere Application Server 7.0 before Fix Pack 1 (7.0.0.1), 6.1 before Fix Pack 23 (6.1.0.23),and 6.0.2 before Fix Pack 33 (6.0.2.33) does not properly enforce (1) nonce and (2) timestamp expiration values in WS-Security bindings as stored in the com.ibm.wsspi.wssecurity.core custom property, which allows remote authenticated users to conduct session hijacking attacks.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Ibm ≫ Websphere Application Server Version6.0.2
Ibm ≫ Websphere Application Server Version6.0.2 Editionfp17
Ibm ≫ Websphere Application Server Version6.0.2.1
Ibm ≫ Websphere Application Server Version6.0.2.2
Ibm ≫ Websphere Application Server Version6.0.2.3
Ibm ≫ Websphere Application Server Version6.0.2.4
Ibm ≫ Websphere Application Server Version6.0.2.5
Ibm ≫ Websphere Application Server Version6.0.2.6
Ibm ≫ Websphere Application Server Version6.0.2.7
Ibm ≫ Websphere Application Server Version6.0.2.8
Ibm ≫ Websphere Application Server Version6.0.2.9
Ibm ≫ Websphere Application Server Version6.0.2.10
Ibm ≫ Websphere Application Server Version6.0.2.11
Ibm ≫ Websphere Application Server Version6.0.2.12
Ibm ≫ Websphere Application Server Version6.0.2.13
Ibm ≫ Websphere Application Server Version6.0.2.14
Ibm ≫ Websphere Application Server Version6.0.2.15
Ibm ≫ Websphere Application Server Version6.0.2.16
Ibm ≫ Websphere Application Server Version6.0.2.17
Ibm ≫ Websphere Application Server Version6.0.2.18
Ibm ≫ Websphere Application Server Version6.0.2.19
Ibm ≫ Websphere Application Server Version6.0.2.20
Ibm ≫ Websphere Application Server Version6.0.2.21
Ibm ≫ Websphere Application Server Version6.0.2.22
Ibm ≫ Websphere Application Server Version6.0.2.23
Ibm ≫ Websphere Application Server Version6.0.2.24
Ibm ≫ Websphere Application Server Version6.0.2.25
Ibm ≫ Websphere Application Server Version6.0.2.27
Ibm ≫ Websphere Application Server Version6.0.2.28
Ibm ≫ Websphere Application Server Version6.0.2.29
Ibm ≫ Websphere Application Server Version6.0.2.30
Ibm ≫ Websphere Application Server Version6.0.2.31
Ibm ≫ Websphere Application Server Version6.0.2.32
Ibm ≫ Websphere Application Server Version6.1
Ibm ≫ Websphere Application Server Version6.1.0
Ibm ≫ Websphere Application Server Version6.1.0.0
Ibm ≫ Websphere Application Server Version6.1.0.1
Ibm ≫ Websphere Application Server Version6.1.0.2
Ibm ≫ Websphere Application Server Version6.1.0.3
Ibm ≫ Websphere Application Server Version6.1.0.4
Ibm ≫ Websphere Application Server Version6.1.0.5
Ibm ≫ Websphere Application Server Version6.1.0.6
Ibm ≫ Websphere Application Server Version6.1.0.7
Ibm ≫ Websphere Application Server Version6.1.0.8
Ibm ≫ Websphere Application Server Version6.1.0.9
Ibm ≫ Websphere Application Server Version6.1.0.10
Ibm ≫ Websphere Application Server Version6.1.0.11
Ibm ≫ Websphere Application Server Version6.1.0.12
Ibm ≫ Websphere Application Server Version6.1.0.13
Ibm ≫ Websphere Application Server Version6.1.0.14
Ibm ≫ Websphere Application Server Version6.1.0.15
Ibm ≫ Websphere Application Server Version6.1.0.16
Ibm ≫ Websphere Application Server Version6.1.0.17
Ibm ≫ Websphere Application Server Version6.1.0.18
Ibm ≫ Websphere Application Server Version6.1.0.19
Ibm ≫ Websphere Application Server Version6.1.0.20
Ibm ≫ Websphere Application Server Version6.1.0.21
Ibm ≫ Websphere Application Server Version6.1.0.22
Ibm ≫ Websphere Application Server Version7.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.42% | 0.609 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 5.5 | 8 | 4.9 |
AV:N/AC:L/Au:S/C:P/I:P/A:N
|
CWE-287 Improper Authentication
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.