SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Web Server/CGI)  >   Oracle WebLogic Vendors:   BEA Systems
BEA WebLogic Server and WebLogic Portal Have Multiple Vulnerabilities
SecurityTracker Alert ID:  1014049
SecurityTracker URL:  http://securitytracker.com/id/1014049
CVE Reference:   CVE-2007-2694   (Links to External Site)
Updated:  Feb 21 2008
Original Entry Date:  May 25 2005
Impact:   Denial of service via network, Disclosure of system information, Disclosure of user information, Execution of arbitrary code via network, Modification of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 6.1, 7.0, 8.1, 9.0, 9.1, 10.0
Description:   Several vulnerabilities were reported in BEA WebLogic Server, WebLogic Express, and WebLogic Portal. A remote user can cause denial of service conditions or conduct cross-site scripting attacks. A remote authenticated user may be able to gain additional privileges.

A remote user can cause denial of service conditions (BEA05-82.00). A remote user can conduct cross-site scripting attacks (CVE-2007-2694; BEA08-80.04, originally BEA05-80.01). The system may echo an incorrect password after a failed login attempt (BEA05-78.00). A web application user's session is not terminated when the application is redeployed (BEA05-77.00). The server may fail to properly audit and process exceptions generated by security providers (BEA05-76.00). Certain users with the Monitor security role may be able to access JDBC connection pools (BEA05-75.00). The system may disclose information that indicates why a login attempt has failed (BEA05-74.01). A user whose account in the Active Directory LDAP server has been disabled may still be able to access the system (BEA05-72.01). A remote user may be able to cause cluster performance to degrade due to a cookie processing flaw (BEA05-79.00). A remote user can bind anonymously to the embedded LDAP server to potentially obtain some user information or cause denial of service conditions by initiating many connections (BEA05-81.00).

Versions 6.1, 7.0, and 8.1 are affected.

The cross-site scripting vulnerability [BEA08-80.04] also affects Versions 9.0, 9.1, and 10.0.

Impact:   A remote user can cause denial of service conditions.

A remote user can conduct cross-site scripting attacks.

A remote authenticated user may be able to gain additional privileges.

A remote user can cause cluster performance to degrade.

A remote user can obtain user information.

Solution:   The vendor has issued several security advisories describing the applicable fixes: BEA05-52.02, BEA05-72.01, BEA05-74.01, BEA05-75.00, BEA05-76.00, BEA05-77.00, BEA05-78.00, BEA05-79.00, BEA05-80.00, BEA05-81.00, and BEA05-82.00.

The advisories are available at:

http://dev2dev.bea.com/advisoriesnotifications/

The vendor has issued several revisions for the cross-site scripting vulnerability. On May 14, 2007, the cross-site scripting vulnerability was newly assigned CVE-2007-2694. On February 19, 2008, the vendor issued advisory BEA08-80.04 to provide a revised fix for versions 10.0, 9.2, 9.1, 9.0, 8.1, 7.0 and 6.1. BEA08-80.04 supersedes BEA07-80.03, BEA05-80.02, BEA05-80.01, and BEA05-80.00 and is available at:

http://dev2dev.bea.com/pub/advisory/273

Vendor URL:  dev2dev.bea.com/pub/advisory/15 (Links to External Site)
Cause:   Access control error, Input validation error, State error
Underlying OS:  Linux (Any), UNIX (AIX), UNIX (HP/UX), UNIX (Solaris - SunOS), UNIX (Tru64), Windows (NT), Windows (2000)

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC