Overview
BEA WebLogic Server stores the administrator password used to boot the server in clear text within the config.xml file.
Description
BEA Systems describes WebLogic Server as "an industrial-strength application infrastructure for developing, integrating, securing, and managing distributed Java applications." There is a vulnerability in the way BEA Weblogic Server stores the administrative password used to boot the server. According to the BEA Security Advisory,
|
Impact
A user with access to the config.xml file may acquire the administrator password used to boot the server. The user could subsequently use this password to impersonate an administrator. |
Solution
Apply PatchBEA has released an advisory to address this issue. According to the BEA Security Advisory, it is recommended that users upgrade to Service Pack 2. |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
Acknowledgements
This vulnerability was reported by BEA Systems Inc.
This document was written by Lucy Crocker.
Other Information
CVE IDs: | None |
Severity Metric: | 7.24 |
Date Public: | 2004-01-27 |
Date First Published: | 2004-04-12 |
Date Last Updated: | 2004-04-14 16:20 UTC |
Document Revision: | 12 |