BEA WebLogic 5.1.x does not properly restrict access to the JSPServlet, which could allow remote attackers to compile and execute Java JSP code by directly invoking the servlet on any source file.
References
Link | Resource |
---|---|
http://archives.neohapsis.com/archives/bugtraq/2000-07/0434.html | Patch Vendor Advisory |
http://developer.bea.com/alerts/security_000731.html | |
http://www.securityfocus.com/bid/1525 | Exploit Patch Vendor Advisory |
http://archives.neohapsis.com/archives/bugtraq/2000-07/0434.html | Patch Vendor Advisory |
http://developer.bea.com/alerts/security_000731.html | |
http://www.securityfocus.com/bid/1525 | Exploit Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:33
Type | Values Removed | Values Added |
---|---|---|
References | () http://archives.neohapsis.com/archives/bugtraq/2000-07/0434.html - Patch, Vendor Advisory | |
References | () http://developer.bea.com/alerts/security_000731.html - | |
References | () http://www.securityfocus.com/bid/1525 - Exploit, Patch, Vendor Advisory |
Information
Published : 2000-10-20 04:00
Updated : 2024-11-20 23:33
NVD link : CVE-2000-0684
Mitre link : CVE-2000-0684
CVE.ORG link : CVE-2000-0684
JSON object : View
Products Affected
bea
- weblogic_server
CWE