BEA WebLogic Server 8.1 through 8.1 SP5 does not properly enforce access control after a dynamic update and dynamic redeployment of an application that is implemented through exploded jars, which allows attackers to bypass intended access restrictions.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:25
Type | Values Removed | Values Added |
---|---|---|
References | () http://dev2dev.bea.com/pub/advisory/209 - Patch, Vendor Advisory | |
References | () http://osvdb.org/38509 - | |
References | () http://secunia.com/advisories/23750 - | |
References | () http://securitytracker.com/id?1017525 - | |
References | () http://www.securityfocus.com/bid/22082 - | |
References | () http://www.vupen.com/english/advisories/2007/0213 - |
Information
Published : 2007-01-23 00:28
Updated : 2024-11-21 00:25
NVD link : CVE-2007-0415
Mitre link : CVE-2007-0415
CVE.ORG link : CVE-2007-0415
JSON object : View
Products Affected
bea
- weblogic_server
CWE