search menu icon-carat-right cmu-wordmark

CERT Coordination Center

BEA WebLogic Server contains a vulnerability in the URL pattern matching

Vulnerability Note VU#184558

Original Release Date: 2004-04-26 | Last Revised: 2004-04-26

Overview

There is a vulnerability in the URL pattern matching functionality of BEA WebLogic Server that could allow URL restrictions to be bypassed.

Description

BEA Systems describes WebLogic Server as "an industrial-strength application infrastructure for developing, integrating, securing, and managing distributed Java applications." The WebLogic Server provides a feature that allows an administrator to restrict access to certain URLs. There is a vulnerability in this URL pattern matching feature that could cause patterns ending in "*" rather than "/*" to be evaluated as wildcard patterns.

According to the BEA Security Advisory,
In WebLogic Server version 6.x, the illegal URL pattern of /mydir* is treated the same as the legal URL pattern /mydir/*. If a WebLogic Server version 6.x Web application used the illegal syntax and is moved to WebLogic Server version 7.x or greater, the URL patterns that were protected by the illegal syntax will stop being protected. There is no notification in the change of protection.

According to the BEA Security Advisory, the following versions of WebLogic Server and Express are affected by this vulnerability:

    • WebLogic Server and WebLogic Express version 8.1 through Service Pack 1, on all platforms
    • WebLogic Server and WebLogic Express version 7.0 through Service Pack 4, on all platforms

Impact

A remote user could access restricted URLs that were previously protected by specific URL pattern matching syntax.

Solution

Upgrade or Fix SyntaxWebLogic Server and WebLogic Express version 8.1
Upgrade to WebLogic Server and WebLogic Express version 8.1 Service Pack 2.

or

In all deployed web applications, convert the illegal URL patterns to legal syntax.

WebLogic Server and WebLogic Express version 7.0
Upgrade to WebLogic Server and WebLogic Express version 7.0 Service Pack 5.

or

In all deployed web applications, convert the illegal URL patterns to legal syntax.

Vendor Information

184558
 

BEA Systems Inc. Affected

Updated:  April 26, 2004

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

Please refer to BEA Security Advisory BEA04-56.00.

If you have feedback, comments, or additional information about this vulnerability, please send us email.


CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This vulnerability was reported by BEA Systems Inc.

This document was written by Damon Morda.

Other Information

CVE IDs: None
Severity Metric: 4.16
Date Public: 2004-04-21
Date First Published: 2004-04-26
Date Last Updated: 2004-04-26 20:44 UTC
Document Revision: 23

Sponsored by CISA.