Security Bulletin
Summary
In the WebSphere Application Server (WAS) admin console where the Rational Asset Manager (RAM) is deployed, vulnerabilities such as allowing a remote attacker to access the classloader through class property, and an authenticated attacker obtaining sensitive information caused by improper parameter checking are observed. Information about these security vulnerabilities affecting WebSphere Application Server are published in the respective security bulletins.
Vulnerability Details
Refer to the security bulletin(s) listed in the Remediation/Fixes section
Affected Products and Versions
IBM Rational Asset Manager 7.5 .1, 7.5.2.x, 7.5.3.x, and 7.5.4.x.
NOTE: Rational Asset Manager 7.5.2 and later versions does not support embedded WebSphere Application Server.
Remediation/Fixes
Refer to the following security bulletin for vulnerability details and information about fixes addressed by IBM WebSphere Application Server (WAS).
Affected Supporting Product | Affected Supporting Product Security Bulletin |
IBM WebSphere Application Server Version 7.0, 8.0, 8.5, and 9.0. | Security Bulletin: Information disclosure in WebSphere Application Server (CVE-2020-4329) |
Security Bulletin: WebSphere Application Server is vulnerable to Apache Commons Beanutils (CVE-2019-10086) |
Workarounds and Mitigations
None
Get Notified about Future Security Bulletins
References
Change History
04 Jan 2020: Initial Publication
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
Disclaimer
Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.
Document Location
Worldwide
Was this topic helpful?
Document Information
Modified date:
04 January 2021
UID
ibm16395488