Vulnerability Details : CVE-2015-1927
The default configuration of IBM WebSphere Application Server (WAS) 7.0.0 before 7.0.0.39, 8.0.0 before 8.0.0.11, and 8.5 before 8.5.5.6 has a false value for the com.ibm.ws.webcontainer.disallowServeServletsByClassname WebContainer property, which allows remote attackers to obtain privileged access via unspecified vectors.
Vulnerability category: BypassGain privilege
Products affected by CVE-2015-1927
- cpe:2.3:a:ibm:websphere_application_server:7.0:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:7.0.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:7.0.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:7.0.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:7.0.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:7.0.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:7.0.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:7.0.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:7.0.0.8:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:7.0.0.9:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:7.0.0.12:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:7.0.0.11:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:7.0.0.10:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:7.0.0.13:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:7.0.0.15:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:7.0.0.17:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:8.0.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:7.0.0.19:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:8.0.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:7.0.0.21:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:8.0.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:7.0.0.23:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:8.0.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:8.5.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:8.0.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:7.0.0.16:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:7.0.0.14:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:7.0.0.18:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:7.0.0.22:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:7.0.0.25:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:8.0.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:8.5.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:7.0.0.27:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:7.0.0.24:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:8.5.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:8.0.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:7.0.0.29:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:8.5.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:8.0.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:8.5.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:7.0.0.31:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:8.0.0.8:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:8.5.5.2:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:7.0.0.34:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:7.0.0.33:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:8.0.0.9:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:8.5.5.3:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:7.0.0.32:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:8.5.5.4:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:8.5.5.5:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:7.0.0.37:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:8.0.0.10:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:7.0.0.36:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:websphere_application_server:7.0.0.38:*:*:*:*:*:*:*
Threat overview for CVE-2015-1927
Top countries where our scanners detected CVE-2015-1927
Top open port discovered on systems with this issue
9080
IPs affected by CVE-2015-1927 579
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2015-1927!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2015-1927
0.89%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 80 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2015-1927
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST |
CWE ids for CVE-2015-1927
-
The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-1927
-
http://www-01.ibm.com/support/docview.wss?uid=swg21963275
IBM Security Bulletin: Multiple Security Vulnerabilities fixed in IBM WebSphere Application Server 8.0.0.11
-
http://www.securityfocus.com/bid/75486
IBM WebSphere Application Server CVE-2015-1927 Remote Privilege Escalation Vulnerability
-
http://www-01.ibm.com/support/docview.wss?uid=swg1PI31622
IBM notice: The page you requested cannot be displayed
-
http://www.securitytracker.com/id/1033383
IBM WebSphere Application Server Default serveServletsbyClassname Setting Lets Remote Users Access the Target System - SecurityTracker
-
http://www-01.ibm.com/support/docview.wss?uid=swg21959083
IBM Security Bulletin: Multiple Security Vulnerabilities fixed in IBM WebSphere Application Server 8.5.5.6Patch;Vendor Advisory
Jump to