BEA WebLogic < 5.1.0 SP8 Hex-encoded Request JSP Source Disclosure

Medium Nessus Network Monitor Plugin ID 1525

Synopsis

The remote host is running a vulnerable version of BEA WebLogic.

Description

BEA WebLogic may be tricked into revealing the source code of the remote JSP scripts by using simple URL encoding of the characters in the filename extensions (ie: default.js%70 instead of .jsp).

Solution

Upgrade to WebLogic version 5.1.0 SP8 or higher.

See Also

http://archives.neohapsis.com/archives/bugtraq/2001-03/0463.html

Plugin Details

Severity: Medium

ID: 1525

File Name: 1525.prm

Family: Web Servers

Published: 2004/08/18

Modified: 2016/11/23

Dependencies: 1442

Nessus ID: 10715

Risk Information

Risk Factor: Medium

CVSSv2

Base Score: 5

Temporal Score: 4.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Temporal Vector: CVSS2#E:H/RL:OF/RC:C

CVSSv3

Base Score: 5.3

Temporal Score: 5.1

Vector: CVSS3#AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Temporal Vector: CVSS3#E:H/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:bea:weblogic_server

Reference Information

BID: 2527