{"id":518,"date":"2016-03-16T21:46:48","date_gmt":"2016-03-16T16:16:48","guid":{"rendered":"http:\/\/www.middlewareprimer.com\/blog\/?p=518"},"modified":"2016-03-16T21:46:48","modified_gmt":"2016-03-16T16:16:48","slug":"security-vulnerabilities-websphere-portal-server","status":"publish","type":"post","link":"http:\/\/www.middlewareprimer.com\/blog\/2016\/03\/16\/security-vulnerabilities-websphere-portal-server\/","title":{"rendered":"Security Vulnerabilities in Websphere Portal Server"},"content":{"rendered":"<p>Security Vulnerabilities in Websphere Portal Server were reported recently and customers were asking me to give an appropriate links for Fixes and Fixpacks. There were released as well along with information on the CVEs. Below information is gathered from IBM Support link and the same information is provided here.<\/p>\n<p>These Vulnerabilities effect the customer data, so its a good practice to update the Product with Fixes and Fixpacks. Problem with these CVE&#8217;s (Common Vulnerabilities and Exposures) are that there is no Workaround given for resolution.<\/p>\n<p><b>CVEID:<\/b> <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-7428\" target=\"_blank\"><u>CVE-2015-7428<\/u><\/a><b><br \/>\n<\/b><\/p>\n<p><b>CVEID:<\/b> <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-7455\" target=\"_blank\"><u>CVE-2015-7455<\/u><\/a><br \/>\n<b>CVEID:<\/b> <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-7457\" target=\"_blank\"><u>CVE-2015-7457<\/u><\/a><\/p>\n<p><b>CVEID:<\/b> <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-7491\" target=\"_blank\"><u>CVE-2015-7491<\/u><\/a><b><br \/>\n<\/b><\/p>\n<p><b>CVEID:<\/b> <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-0243\" target=\"_blank\"><u>CVE-2016-0243<\/u><\/a><b><br \/>\n<\/b><\/p>\n<p><b>CVEID:<\/b> <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-0244\" target=\"_blank\"><u>CVE-2016-0244<\/u><\/a><b><br \/>\n<\/b><\/p>\n<p><b>CVEID:<\/b> <a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-0245\" target=\"_blank\"><u>CVE-2016-0245<\/u><\/a><b><br \/>\n<\/b><\/p>\n<p>Link for reference: <a href=\"http:\/\/www-01.ibm.com\/support\/docview.wss?uid=swg21976358\" target=\"_blank\">http:\/\/www-01.ibm.com\/support\/docview.wss?uid=swg21976358<\/a><\/p>\n<p>Based on the suggestions given in Support link, we may need to wither apply the interim fix or go for a Fixpack update on Websphere Portal Server product.<\/p>\n<p>Support link suggests to upgrade Portal at latest Fixpacks. The 7 CVEs listed above has the following Fixpacks listed and also has their own individual Fixes to be applied after applying FPs. Below are basic for Portal server v8.5 and v8.0.<\/p>\n<p>For 8.5.0<br \/>\nUpgrade to Cumulative Fix 09 (CF09)<br \/>\n(Combined Cumulative Fixes for WebSphere Portal 8.5.0.0: <a href=\"http:\/\/www-01.ibm.com\/support\/docview.wss?uid=swg24037786\" target=\"_blank\">http:\/\/www-01.ibm.com\/support\/docview.wss?uid=swg24037786<\/a>)<\/p>\n<p>For 8.0.0 through 8.0.0.1<br \/>\nUpgrade to Fix Pack 8.0.0.1 with Cumulative Fix 20 (CF20)<br \/>\n(Combined Cumulative Fixes for WebSphere Portal 8.0.0.1: <a href=\"http:\/\/www-01.ibm.com\/support\/docview.wss?uid=swg24034497\" target=\"_blank\">http:\/\/www-01.ibm.com\/support\/docview.wss?uid=swg24034497<\/a>)<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security Vulnerabilities in Websphere Portal Server were reported recently and customers were asking me to give an appropriate links for Fixes and Fixpacks. There were released as well along with information on the CVEs. Below information is gathered from IBM Support link and the same information is provided here. These Vulnerabilities effect the customer data, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[151,9],"class_list":["post-518","post","type-post","status-publish","format-standard","hentry","category-websphere-portal-server","tag-cveid","tag-websphere-portal-server"],"_links":{"self":[{"href":"http:\/\/www.middlewareprimer.com\/blog\/wp-json\/wp\/v2\/posts\/518","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.middlewareprimer.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.middlewareprimer.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.middlewareprimer.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.middlewareprimer.com\/blog\/wp-json\/wp\/v2\/comments?post=518"}],"version-history":[{"count":3,"href":"http:\/\/www.middlewareprimer.com\/blog\/wp-json\/wp\/v2\/posts\/518\/revisions"}],"predecessor-version":[{"id":553,"href":"http:\/\/www.middlewareprimer.com\/blog\/wp-json\/wp\/v2\/posts\/518\/revisions\/553"}],"wp:attachment":[{"href":"http:\/\/www.middlewareprimer.com\/blog\/wp-json\/wp\/v2\/media?parent=518"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.middlewareprimer.com\/blog\/wp-json\/wp\/v2\/categories?post=518"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.middlewareprimer.com\/blog\/wp-json\/wp\/v2\/tags?post=518"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}