SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Application (Web Server/CGI)  >   Oracle WebLogic Vendors:   BEA Systems
WebLogic 'stopWebLogic.sh' Displays the Administrative Password When Typed By the Administrator
SecurityTracker Alert ID:  1016094
SecurityTracker URL:  http://securitytracker.com/id/1016094
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  May 15 2006
Impact:   Disclosure of authentication information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 7.0 SP5, 8.1 SP2; and prior service packs
Description:   A vulnerability was reported in WebLogic. A physically local user may observe the administrative password in certain cases.

The 'stopWebLogic.sh' script echoes the system password when the administrator types in the password. A physically local user may be able to observe the password.

The affected script is installed when the WebLogic Workshop domain template is selected in the Platform DomainWizard to create a new domain.

Impact:   A physically local user may be able to observe the administrative password.
Solution:   The vendor has provided the following solution [quoted]:

WebLogic Platform 8.1

1. In each domain where it exists, modify the stopWebLogic.sh script to contain the following lines before the first java command (an 8.1 sample is included in the zip file below):

DOMAIN_HOME="/the full path to your domain/"
. ${DOMAIN_HOME}/setDomainEnv.sh

2. Upgrade to WebLogic Platform 8.1 Service Pack 3 to update the WebLogic Workshop domain template.

WebLogic Platform 7.0

1. In each domain where it exists, replace the stopWebLogic.sh script with the following script:
ftp://ftpna.bea.com/pub/releases/security/CR130515.zip
2. Upgrade to WebLogic Platform 7.0 Service Pack 6 to update the WebLogic Workshop domain template.


The vendor's advisory is available at:

http://dev2dev.bea.com/pub/advisory/181

Vendor URL:  dev2dev.bea.com/pub/advisory/181 (Links to External Site)
Cause:   Access control error
Underlying OS:   Linux (Red Hat Enterprise), Linux (SuSE), UNIX (AIX), UNIX (HP/UX), UNIX (Solaris - SunOS)

Message History:   None.


 Source Message Contents

Date:  Mon, 15 May 2006 16:33:26 -0400
Subject:  BEA WebLogic vulnerabilities


WebLogic Server 6.1, 7.0, 8.1, 9.0, 9.1
  
Security Advisory (BEA06-81.02, BEA06-87.01, BEA06-114.01, BEA06-120.01, 
BEA06-121.00, BEA06-124.00, BEA06-125.00, BEA06-126.00, BEA06-127.00, 
BEA06-128.00, BEA06-129.00, BEA06-130.00, BEA06-131.00, BEA06-132.00, 
BEA06-133.00)
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2014, SecurityGlobal.net LLC