Summary
Detail | |||
---|---|---|---|
Vendor | Bea | First view | 2000-10-20 |
Product | Weblogic Server | Last view | 2008-07-22 |
Version | 4.5.2 | Type | Application |
Update | * | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:a:bea:weblogic_server |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
10 | 2008-07-22 | CVE-2008-3257 | Stack-based buffer overflow in the Apache Connector (mod_wl) in Oracle WebLogic Server (formerly BEA WebLogic Server) 10.3 and earlier allows remote attackers to execute arbitrary code via a long HTTP version string, as demonstrated by a string after "POST /.jsp" in an HTTP request. |
6.4 | 2007-08-30 | CVE-2007-4615 | The SSL client implementation in BEA WebLogic Server 7.0 SP7, 8.1 SP2 through SP6, 9.0, 9.1, 9.2 Gold through MP2, and 10.0 sometimes selects the null cipher when others are available, which might allow remote attackers to intercept communications. |
7.5 | 2007-01-22 | CVE-2007-0425 | Unspecified vulnerability in BEA WebLogic Platform and Server 8.1 through 8.1 SP5, and JRockit 1.4.2 R4.5 and earlier, allows attackers to gain privileges via unspecified vectors, related to an "overflow condition," probably a buffer overflow. |
7.5 | 2007-01-22 | CVE-2007-0418 | BEA WebLogic Server 7.0 through 7.0 SP6, 8.1 through 8.1 SP5, 9.0, and 9.1 does not enforce a security policy that declares permissions for EJB methods that have array parameters, which allows remote attackers to obtain unauthorized access to these methods. |
10 | 2007-01-22 | CVE-2007-0417 | BEA WebLogic Server 7.0 through 7.0 SP7, 8.1 through 8.1 SP5, 9.0, and 9.1, when using the WebLogic Server 6.1 compatibility realm, allows attackers to execute certain EJB container persistence operations with an administrative identity. |
5 | 2007-01-22 | CVE-2007-0415 | BEA WebLogic Server 8.1 through 8.1 SP5 does not properly enforce access control after a dynamic update and dynamic redeployment of an application that is implemented through exploded jars, which allows attackers to bypass intended access restrictions. |
5 | 2007-01-22 | CVE-2007-0414 | BEA WebLogic Server 6.1 through 6.1 SP7, 7.0 through 7.0 SP6, 8.1 through 8.1 SP5, and 9.0 allows remote attackers to cause a denial of service (server hang) via certain requests that cause muxer threads to block when processing error pages. |
4.4 | 2007-01-22 | CVE-2007-0413 | BEA WebLogic Server 8.1 through 8.1 SP5 stores cleartext data in a backup of config.xml after offline editing, which allows local users to obtain sensitive information by reading this backup file. |
6.8 | 2007-01-22 | CVE-2007-0411 | BEA WebLogic Server 8.1 through 8.1 SP5, 9.0, 9.1, and 9.2 Gold, when WS-Security is used, does not properly validate certificates, which allows remote attackers to conduct a man-in-the-middle (MITM) attack. |
1.5 | 2007-01-22 | CVE-2007-0409 | BEA WebLogic 7.0 through 7.0 SP6, 8.1 through 8.1 SP4, and 9.0 initial release does not encrypt passwords stored in the JDBCDataSourceFactory MBean Properties, which allows local administrative users to read the cleartext password. |
7.5 | 2007-01-22 | CVE-2007-0408 | BEA Weblogic Server 8.1 through 8.1 SP4 does not properly validate client certificates when reusing cached connections, which allows remote attackers to obtain access via an untrusted X.509 certificate. |
9.8 | 2005-05-24 | CVE-2005-1744 | BEA WebLogic Server and WebLogic Express 7.0 through Service Pack 5 does not log out users when an application is redeployed, which allows those users to continue to access the application without having to log in again, which may be in violation of newly changed security constraints or role mappings. |
4.3 | 2003-12-01 | CVE-2003-0624 | Cross-site scripting (XSS) vulnerability in InteractiveQuery.jsp for BEA WebLogic 8.1 and earlier allows remote attackers to inject malicious web script via the person parameter. |
10 | 2001-02-12 | CVE-2001-0098 | Buffer overflow in Bea WebLogic Server before 5.1.0 allows remote attackers to execute arbitrary commands via a long URL that begins with a ".." string. |
10 | 2000-10-20 | CVE-2000-0681 | Buffer overflow in BEA WebLogic server proxy plugin allows remote attackers to execute arbitrary commands via a long URL with a .JSP extension. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
33% (1) | CWE-459 | Incomplete Cleanup |
33% (1) | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
33% (1) | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') |
CAPEC : Common Attack Pattern Enumeration & Classification
id | Name |
---|---|
CAPEC-104 | Cross Zone Scripting |
SAINT Exploits
Description | Link |
---|---|
Oracle WebLogic Server Apache Connector POST buffer overflow | More info here |
Open Source Vulnerability Database (OSVDB)
id | Description |
---|---|
47096 | Oracle Weblogic Apache Connector POST Request Overflow |
38519 | BEA WebLogic Server SSL Server Cipher Selection Fallback Weakness |
38515 | BEA Multiple Products Unspecified Remote Overflow |
38512 | BEA WebLogic Server EJB Methods Remote Privilege Escalation |
38511 | BEA WebLogic Server Compatibility Realm EJB Container Persistence Privileged ... |
38509 | BEA WebLogic Server Exploded jar Dynamic Update Access Restriction Bypass |
38506 | BEA WebLogic Server muxer Thread Error Page Remote DoS |
38504 | BEA WebLogic Server config.xml Backup Cleartext Information Disclosure |
38503 | BEA WebLogic Server WS-Security Certificate Validation MiTM Weakness |
38501 | BEA WebLogic JDBCDataSourceFactory MBean Properties Cleartext Password Local ... |
38500 | BEA WebLogic Server Cached Connection X.509 Certificate Validation Bypass |
32855 | BEA JRockit Unspecified Remote Overflow |
16835 | BEA WebLogic User Sessions Persistence |
10067 | BEA WebLogic Double Dot GET Request Remote Overflow |
3417 | BEA WebLogic InteractiveQuery.jsp XSS |
1509 | BEA WebLogic Proxy Multiple Overflows |
OpenVAS Exploits
id | Description |
---|---|
2005-11-03 | Name : ServletExec 4.1 / JRun ISAPI DoS File : nvt/servletExec_DoS.nasl |
2005-11-03 | Name : WebLogic Server DoS File : nvt/weblogic_dotdotdos.nasl |
Snort® IPS/IDS
Date | Description |
---|---|
2017-12-19 | Citrix XenApp and XenDesktop XML service memory corruption attempt RuleID : 44877 - Type : SERVER-OTHER - Revision : 2 |
2014-03-06 | Oracle WebLogic Apache Connector buffer overflow attempt RuleID : 29523 - Type : SERVER-APACHE - Revision : 2 |
2014-01-10 | InteractiveQuery.jsp access RuleID : 2395-community - Type : SERVER-WEBAPP - Revision : 11 |
2014-01-10 | InteractiveQuery.jsp access RuleID : 2395 - Type : SERVER-WEBAPP - Revision : 11 |
2014-01-10 | Oracle WebLogic Apache Connector buffer overflow attempt RuleID : 18283 - Type : SERVER-APACHE - Revision : 6 |
2014-01-10 | Oracle WebLogic Apache Connector buffer overflow attempt RuleID : 15511 - Type : SERVER-APACHE - Revision : 9 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2008-08-18 | Name: The remote web server uses a module that is affected by a buffer overflow vul... File: weblogic_mod_wl_overflow.nasl - Type: ACT_GATHER_INFO |
2005-05-24 | Name: The remote web server is affected by multiple flaws. File: bea_81sp4_mult_vulns.nasl - Type: ACT_GATHER_INFO |
2002-05-22 | Name: The remote web server is prone to a denial of service attack. File: servletExec_DoS.nasl - Type: ACT_DESTRUCTIVE_ATTACK |
2001-06-21 | Name: The remote web server is vulnerable to a buffer overflow attack. File: weblogic_dotdotdos.nasl - Type: ACT_DENIAL |