漏洞信息详情
WebSphere Application Server 跨站脚本漏洞
漏洞简介
IBM WebSphere Application Server(WAS)是美国IBM公司的一款应用服务器产品。该产品是JavaEE和Web服务应用程序的平台,也是IBMWebSphere软件平台的基础。
WebSphere Application Server 控制台中存在跨站脚本漏洞。该漏洞源于WEB应用未充分验证请求是否来自可信用户。攻击者可利用该漏洞通过受影响客户端向服务器发送非预期的请求。
漏洞公告
目前厂商已发布升级补丁以修复漏洞,补丁获取链接:
https://www.ibm.com/support/pages/security-bulletin-websphere-application-server-admin-console-vulnerable-cross-site-scripting-cve-2020-4578-0
参考网址
来源:CONFIRM
链接:https://www.ibm.com/support/pages/node/6328895
来源:XF
链接:https://exchange.xforce.ibmcloud.com/vulnerabilities/184433
来源:www.nsfocus.net
链接:http://www.nsfocus.net/vulndb/49832
来源:www.ibm.com
链接:https://www.ibm.com/blogs/psirt/security-bulletin-websphere-application-server-admin-console-is-vulnerable-to-cross-site-scripting-cve-2020-4578/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.3359/
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/WebSphere-AS-Cross-Site-Scripting-via-Server-Admin-Console-33291
来源:nvd.nist.gov
链接:https://nvd.nist.gov/vuln/detail/CVE-2020-4578
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.3200/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.3099/
来源:www.ibm.com
链接:https://www.ibm.com/blogs/psirt/security-bulletin-embedded-websphere-application-server-admin-console-is-vulnerable-to-cross-site-scripting-affects-content-collector-for-email/
来源:www.ibm.com
链接:https://www.ibm.com/blogs/psirt/security-bulletin-multiple-security-vulnerabilities-affect-ibm-websphere-application-server-in-ibm-cloud-4/
来源:www.ibm.com
链接:https://www.ibm.com/blogs/psirt/security-bulletin-multiple-security-vulnerabilities-affect-ibm-websphere-application-server-in-ibm-cloud-5/
受影响实体
暂无
补丁
- WebSphere Application Server 跨站请求伪造漏洞的修复措施<!--2020-9-9-->
还没有评论,来说两句吧...