BEA WebLogic < 5.1.0 SP8 Hex-encoded Request JSP Source Disclosure

medium Nessus Network Monitor Plugin ID 1525

Synopsis

The remote host is running a vulnerable version of BEA WebLogic.

Description

BEA WebLogic may be tricked into revealing the source code of the remote JSP scripts by using simple URL encoding of the characters in the filename extensions (ie: default.js%70 instead of .jsp).

Solution

Upgrade to WebLogic version 5.1.0 SP8 or higher.

See Also

http://archives.neohapsis.com/archives/bugtraq/2001-03/0463.html

Plugin Details

Severity: Medium

ID: 1525

Family: Web Servers

Published: 8/18/2004

Updated: 3/6/2019

Nessus ID: 10715

Risk Information

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 4.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS v3

Risk Factor: Medium

Base Score: 5.3

Temporal Score: 5.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:bea:weblogic_server

Reference Information

BID: 2527