BEA WebLogic Portal 10.0 and 9.2 through Maintenance Pack 2, under certain circumstances, can redirect a user from the https:// URI for the Portal Administration Console to an http URI, which allows remote attackers to sniff the session.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:43
Type | Values Removed | Values Added |
---|---|---|
References | () http://dev2dev.bea.com/pub/advisory/264 - Patch | |
References | () http://secunia.com/advisories/29041 - | |
References | () http://www.securitytracker.com/id?1019442 - | |
References | () http://www.vupen.com/english/advisories/2008/0613 - |
Information
Published : 2008-02-21 01:44
Updated : 2024-11-21 00:43
NVD link : CVE-2008-0870
Mitre link : CVE-2008-0870
CVE.ORG link : CVE-2008-0870
JSON object : View
Products Affected
oracle
- weblogic_portal
bea_systems
- weblogic_portal
CWE
CWE-59
Improper Link Resolution Before File Access ('Link Following')