Secunia CSI7
Advisories
Research
Forums
Create Profile
Our Commitment
Database
Search
Advisories by Product
Advisories by Vendor
Terminology
Report Vulnerability
Insecure Library Loading
Moderately critical

BEA WebLogic Server/Express Vulnerabilities and Security Issues

-

Release Date:  2006-01-24    Last Update:  2006-05-16    Views:  12,820

Secunia Advisory SA18592

Where:

From remote

Impact:

Security Bypass, Exposure of system information, Exposure of sensitive information, DoS

Solution Status:

Vendor Patch

CVE Reference(s):

Description


Multiple vulnerabilities and security issues have been reported in WebLogic Server and WebLogic Express, where the most critical ones potentially can be exploited by malicious people to cause a DoS (Denial of Service), disclose sensitive information, and bypass certain security restrictions.

1) An error in the MBean protection can be exploited by a malicious Java client to access protected MBean attributes or cause DoS on a vulnerable server via RMI (Remote Method Invocation).

The vulnerability affects the following versions:
* WebLogic Server 8.1 through Service Pack 4 (all platforms)
* WebLogic Server 7.0 through Service Pack 6 (all platforms)
* WebLogic Server 6.1 through Service Pack 7 (all platforms)

2) The server log is not properly protected and may be viewed by malicious users.

Successful exploitation requires that the user has been authenticated (there may exist a guest account for domains upgraded from WebLogic Server 6.x).

The security issue affects the following versions:
* WebLogic Server 8.1 through Service Pack 4 (all platforms)
* WebLogic Server 7.0 through Service Pack 6 (all platforms)
* WebLogic Server 6.1 through Service Pack 7 (all platforms)

3) When a password change occurs, the WebLogic Auditing provider writes the old and new password in clear-text to the "DefaultAuditRecorder.log" file and potentially other audit providers' audit stores.

Successful exploitation requires that the site has enabled configuration auditing.

The security issue affects the following versions:
* WebLogic Server 8.1 through Service Pack 4 (all platforms)

4) System passwords are not properly protected from being decrypted. This can be exploited to decrypt system passwords via a malicious application (e.g. EJBs or servlets) installed on the server .

The security issue affects the following versions:
* WebLogic Server 9.0 (all platforms)
* WebLogic Server 8.1 through Service Pack 4 (all platforms)

5) A new security provider, which has been configured, is not activated until the server reboots. This may cause users and security policies to be added or removed to a non-active provider.

The security issue affects the following version:
* WebLogic Server 9.0 (all platforms)

6) The usage of connection filters may in certain situations cause the server performance to decrease.

The security issue affects the following versions:
* WebLogic Server 9.0 (all platforms)
* WebLogic Server 8.1 through Service Pack 5 (all platforms)
* WebLogic Server 7.0 through Service Pack 6 (all platforms)

7) An error in the protection of the server's SSL identity can be exploited to obtain the SSL identity via a malicious application running on the server.

The vulnerability affects the following version:
* WebLogic Server 8.1 Service Pack 5

8) Certain security policies added via the console by the administrator does not properly protect JNDI resources. This may be exploited by malicious people to access certain restricted resources.

The security issue affects the following version:
* WebLogic Server 9.0 (all platforms)


Solution:
Apply patches and service packs (see the original vendor advisories).

Provided and/or discovered by:
Reported by the vendor.

Original Advisory:
BEA06-109.00:
http://dev2dev.bea.com/pub/advisory/166

BEA06-111.01:
http://dev2dev.bea.com/pub/advisory/179

BEA06-113.00:
http://dev2dev.bea.com/pub/advisory/170

BEA06-114.01:
http://dev2dev.bea.com/pub/advisory/184

BEA06-116.00:
http://dev2dev.bea.com/pub/advisory/173

BEA06-117.00:
http://dev2dev.bea.com/pub/advisory/174

BEA06-118.00:
http://dev2dev.bea.com/pub/advisory/175

BEA06-119.00:
http://dev2dev.bea.com/pub/advisory/176

Deep Links:
Links available to Secunia VIM customers

Do you have additional information related to this advisory?

Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this information to vuln@secunia.com

Subject: BEA WebLogic Server/Express Vulnerabilities and Security Issues

No posts yet

-

You must be logged in to post a comment.



 Products Solutions Customers Partner Resources Company
 
 Corporate
Vulnerability Intelligence Manager (VIM)
Corporate Software Inspector (CSI)
Consumer
Personal Software Inspector (PSI)
Online Software Inspector (OSI)
 Industry
Compliance
Technology
Integration
 Customers
Testimonials
 VARS
MSSP
Technology Partners
References
 Factsheets
Reports
Webinars
Events
 About us
Careers
Memberships
Newsroom


 
© 2002-2014 Secunia ApS - Rued Langgaards Vej 8, 4th floor, DK-2300 Copenhagen, Denmark - +45 7020 5144
Terms & Conditions and Copyright - Privacy - Report Vulnerability