The HTTP connection-management functionality in Internet Pass-Thru (IPT) before 2.1.0.2 in IBM WebSphere MQ, when HTTPS is disabled, does not properly generate MQIPT Session IDs, which makes it easier for remote attackers to bypass intended restrictions on MQ message data by predicting an ID value.
References
Link | Resource |
---|---|
http://www-01.ibm.com/support/docview.wss?uid=swg21699547 | Patch Vendor Advisory |
http://www.securitytracker.com/id/1032630 | |
http://www-01.ibm.com/support/docview.wss?uid=swg21699547 | Patch Vendor Advisory |
http://www.securitytracker.com/id/1032630 |
Configurations
History
21 Nov 2024, 02:22
Type | Values Removed | Values Added |
---|---|---|
References | () http://www-01.ibm.com/support/docview.wss?uid=swg21699547 - Patch, Vendor Advisory | |
References | () http://www.securitytracker.com/id/1032630 - |
Information
Published : 2015-06-28 14:59
Updated : 2024-11-21 02:22
NVD link : CVE-2015-0173
Mitre link : CVE-2015-0173
CVE.ORG link : CVE-2015-0173
JSON object : View
Products Affected
ibm
- websphere_mq_internet_pass_thru
CWE
CWE-17
DEPRECATED: Code