Overview
There is a vulnerability in BEA WebLogic Server that could allow users to obtain the credentials of the user who booted the server.
Description
BEA Systems describes WebLogic Server as "an industrial-strength application infrastructure for developing, integrating, securing, and managing distributed Java applications." WebLogic Server provides a number of internal methods to interface with the server. A local or remote user with privileges to install and execute code implementing these internal methods could obtain the username and password of the user who booted the system. The BEA Security Advisory states that the following versions of WebLogic Server and Express are affected by this vulnerability:
|
Impact
A local or remote user with privileges to install and execute code on the server could obtain the username and password of the user who booted the server. |
Solution
UpgradeBEA has released an advisory to address this issue. The BEA Security Advisory recommends that users take the following action: |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
Acknowledgements
This vulnerability was reported by BEA Systems Inc.
This document was written by Damon Morda.
Other Information
CVE IDs: | None |
Severity Metric: | 3.12 |
Date Public: | 2004-04-14 |
Date First Published: | 2004-04-22 |
Date Last Updated: | 2004-04-30 18:41 UTC |
Document Revision: | 10 |