The default configuration of BEA WebLogic 5.1.0 allows a remote attacker to view source code of programs by requesting a URL beginning with /file/, which causes the default servlet to display the file without further processing.
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:32
Type | Values Removed | Values Added |
---|---|---|
References | () http://marc.info/?l=bugtraq&m=96161462915381&w=2 - | |
References | () http://www.securityfocus.com/bid/1378 - Exploit, Patch, Vendor Advisory | |
References | () http://www.weblogic.com/docs51/admindocs/http.html#file - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/4775 - |
Information
Published : 2000-06-21 04:00
Updated : 2024-11-20 23:32
NVD link : CVE-2000-0500
Mitre link : CVE-2000-0500
CVE.ORG link : CVE-2000-0500
JSON object : View
Products Affected
bea
- weblogic_server
CWE