IBM WebSphere Application Server 7.0, 8.0, 8.5, and 9.0 could allow a remote attacker to obtain sensitive information caused by improper handling of Administrative Console panel fields. When exploited an attacker could browse the file system. IBM X-Force ID: 134933.
                
            References
                    | Link | Resource | 
|---|---|
| http://www.ibm.com/support/docview.wss?uid=swg22013601 | Patch Vendor Advisory | 
| http://www.securityfocus.com/bid/104134 | Third Party Advisory VDB Entry | 
| http://www.securitytracker.com/id/1040890 | Third Party Advisory VDB Entry | 
| https://exchange.xforce.ibmcloud.com/vulnerabilities/134933 | VDB Entry Vendor Advisory | 
| http://www.ibm.com/support/docview.wss?uid=swg22013601 | Patch Vendor Advisory | 
| http://www.securityfocus.com/bid/104134 | Third Party Advisory VDB Entry | 
| http://www.securitytracker.com/id/1040890 | Third Party Advisory VDB Entry | 
| https://exchange.xforce.ibmcloud.com/vulnerabilities/134933 | VDB Entry Vendor Advisory | 
Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    21 Nov 2024, 03:22
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://www.ibm.com/support/docview.wss?uid=swg22013601 - Patch, Vendor Advisory | |
| References | () http://www.securityfocus.com/bid/104134 - Third Party Advisory, VDB Entry | |
| References | () http://www.securitytracker.com/id/1040890 - Third Party Advisory, VDB Entry | |
| References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/134933 - VDB Entry, Vendor Advisory | 
Information
                Published : 2018-05-04 14:29
Updated : 2024-11-21 03:22
NVD link : CVE-2017-1743
Mitre link : CVE-2017-1743
CVE.ORG link : CVE-2017-1743
JSON object : View
Products Affected
                ibm
- websphere_application_server
CWE
                
                    
                        
                        CWE-200
                        
            Exposure of Sensitive Information to an Unauthorized Actor
