WebLogic Internal Management Servlet Authentication Bypass

high Nessus Network Monitor Plugin ID 1455

Synopsis

The remote host is vulnerable to a flaw which allows for the bypassing of authentication.

Description

The remote web server is an unpatched version of WebLogic. This version has an internal management servlet which does not properly check the user credentials and can be accessed from the outside, allowing an attacker to change the passwords of the users or even to upload or download any file on the remote server.

Solution

Apply SP2 rolling patch 3 on WebLogic 6.0, service pack 4 on WebLogic 6.1 and SP2 on WebLogic 7.0

See Also

http://dev2dev.bea.com/resourcelibrary/advisoriesnotifications/BEA03-28.jsp

Plugin Details

Severity: High

ID: 1455

Family: Web Servers

Published: 8/20/2004

Updated: 3/6/2019

Nessus ID: 11486

Risk Information

VPR

Risk Factor: Medium

Score: 5.8

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: High

Base Score: 7.3

Temporal Score: 7

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:bea:weblogic_server

Reference Information

CVE: CVE-2003-0151, CVE-2003-1095

BID: 7122, 7124, 7131, 7130