The JMS Server in BEA WebLogic Server 6.1 through SP7, 7.0 through SP6, and 8.1 through SP5 enforces security access policies on the front end, which allows remote attackers to access protected queues via direct requests to the JMS back-end server.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:31
Type | Values Removed | Values Added |
---|---|---|
References | () http://dev2dev.bea.com/pub/advisory/228 - Patch, Vendor Advisory | |
References | () http://osvdb.org/36073 - | |
References | () http://secunia.com/advisories/25284 - Vendor Advisory | |
References | () http://securitytracker.com/id?1018057 - | |
References | () http://www.vupen.com/english/advisories/2007/1815 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/34284 - |
Information
Published : 2007-05-16 01:19
Updated : 2024-11-21 00:31
NVD link : CVE-2007-2696
Mitre link : CVE-2007-2696
CVE.ORG link : CVE-2007-2696
JSON object : View
Products Affected
bea
- weblogic_server
CWE