WebLogic Internal Management Servlet Authentication Bypass

High Nessus Network Monitor Plugin ID 1455

Synopsis

The remote host is vulnerable to a flaw which allows for the bypassing of authentication.

Description

The remote web server is an unpatched version of WebLogic. This version has an internal management servlet which does not properly check the user credentials and can be accessed from the outside, allowing an attacker to change the passwords of the users or even to upload or download any file on the remote server.

Solution

Apply SP2 rolling patch 3 on WebLogic 6.0, service pack 4 on WebLogic 6.1 and SP2 on WebLogic 7.0

See Also

http://dev2dev.bea.com/resourcelibrary/advisoriesnotifications/BEA03-28.jsp

Plugin Details

Severity: High

ID: 1455

File Name: 1455.prm

Family: Web Servers

Published: 2004/08/20

Modified: 2016/01/15

Dependencies: 1442

Nessus ID: 11486

Risk Information

Risk Factor: High

CVSSv2

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:H/RL:OF/RC:C

CVSSv3

Base Score: 7.3

Temporal Score: 7

Vector: CVSS3#AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS3#E:H/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:bea:weblogic_server

Reference Information

CVE: CVE-2003-1095, CVE-2003-0151

BID: 7122, 7124, 7131, 7130