Vulnerabilites related to bea - weblogic_workshop
CVE-2008-0866 (GCVE-0-2008-0866)
Vulnerability from cvelistv5
Published
2008-02-21 01:00
Modified
2024-08-07 08:01
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple cross-site scripting (XSS) vulnerabilities in BEA WebLogic Workshop allow remote attackers to inject arbitrary web script or HTML via an invalid action URI, which is not properly handled by NetUI page flows.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T08:01:40.100Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1019441", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1019441" }, { "name": "BEA08-185.00", "tags": [ "vendor-advisory", "x_refsource_BEA", "x_transferred" ], "url": "http://dev2dev.bea.com/pub/advisory/258" }, { "name": "29041", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29041" }, { "name": "ADV-2008-0611", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/0611" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-02-19T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in BEA WebLogic Workshop allow remote attackers to inject arbitrary web script or HTML via an invalid action URI, which is not properly handled by NetUI page flows." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2008-03-11T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1019441", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1019441" }, { "name": "BEA08-185.00", "tags": [ "vendor-advisory", "x_refsource_BEA" ], "url": "http://dev2dev.bea.com/pub/advisory/258" }, { "name": "29041", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29041" }, { "name": "ADV-2008-0611", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/0611" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-0866", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple cross-site scripting (XSS) vulnerabilities in BEA WebLogic Workshop allow remote attackers to inject arbitrary web script or HTML via an invalid action URI, which is not properly handled by NetUI page flows." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1019441", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1019441" }, { "name": "BEA08-185.00", "refsource": "BEA", "url": "http://dev2dev.bea.com/pub/advisory/258" }, { "name": "29041", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29041" }, { "name": "ADV-2008-0611", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/0611" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-0866", "datePublished": "2008-02-21T01:00:00", "dateReserved": "2008-02-20T00:00:00", "dateUpdated": "2024-08-07T08:01:40.100Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2007-2705 (GCVE-0-2007-2705)
Vulnerability from cvelistv5
Published
2007-05-16 01:00
Modified
2024-08-07 13:49
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Directory traversal vulnerability in the Test View Console in BEA WebLogic Integration 9.2 before SP1 and WebLogic Workshop 8.1 SP2 through SP6, when "deployed in an exploded format," allows remote attackers to list a WebLogic Workshop Directory (wlwdir) parent directory via unspecified vectors.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T13:49:57.112Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1018059", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1018059" }, { "name": "36063", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/36063" }, { "name": "ADV-2007-1815", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/1815" }, { "name": "BEA07-170.00", "tags": [ "vendor-advisory", "x_refsource_BEA", "x_transferred" ], "url": "http://dev2dev.bea.com/pub/advisory/239" }, { "name": "weblogic-testview-directory-traversal(34281)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34281" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-05-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in the Test View Console in BEA WebLogic Integration 9.2 before SP1 and WebLogic Workshop 8.1 SP2 through SP6, when \"deployed in an exploded format,\" allows remote attackers to list a WebLogic Workshop Directory (wlwdir) parent directory via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1018059", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1018059" }, { "name": "36063", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/36063" }, { "name": "ADV-2007-1815", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/1815" }, { "name": "BEA07-170.00", "tags": [ "vendor-advisory", "x_refsource_BEA" ], "url": "http://dev2dev.bea.com/pub/advisory/239" }, { "name": "weblogic-testview-directory-traversal(34281)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34281" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-2705", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Directory traversal vulnerability in the Test View Console in BEA WebLogic Integration 9.2 before SP1 and WebLogic Workshop 8.1 SP2 through SP6, when \"deployed in an exploded format,\" allows remote attackers to list a WebLogic Workshop Directory (wlwdir) parent directory via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1018059", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1018059" }, { "name": "36063", "refsource": "OSVDB", "url": "http://osvdb.org/36063" }, { "name": "ADV-2007-1815", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/1815" }, { "name": "BEA07-170.00", "refsource": "BEA", "url": "http://dev2dev.bea.com/pub/advisory/239" }, { "name": "weblogic-testview-directory-traversal(34281)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34281" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-2705", "datePublished": "2007-05-16T01:00:00", "dateReserved": "2007-05-15T00:00:00", "dateUpdated": "2024-08-07T13:49:57.112Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2008-0869 (GCVE-0-2008-0869)
Vulnerability from cvelistv5
Published
2008-02-21 01:00
Modified
2024-08-07 08:01
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Cross-site scripting (XSS) vulnerability in BEA WebLogic Workshop 8.1 through SP6 and Workshop for WebLogic 9.0 through 10.0 allows remote attackers to inject arbitrary web script or HTML via a "framework defined request parameter" when using WebLogic Workshop or Apache Beehive NetUI framework with page flows.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T08:01:39.719Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1019438", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1019438" }, { "name": "BEA08-189.00", "tags": [ "vendor-advisory", "x_refsource_BEA", "x_transferred" ], "url": "http://dev2dev.bea.com/pub/advisory/263" }, { "name": "29041", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29041" }, { "name": "ADV-2008-0612", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/0612/references" }, { "name": "ADV-2008-0611", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2008/0611" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-02-19T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in BEA WebLogic Workshop 8.1 through SP6 and Workshop for WebLogic 9.0 through 10.0 allows remote attackers to inject arbitrary web script or HTML via a \"framework defined request parameter\" when using WebLogic Workshop or Apache Beehive NetUI framework with page flows." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2008-03-11T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "1019438", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1019438" }, { "name": "BEA08-189.00", "tags": [ "vendor-advisory", "x_refsource_BEA" ], "url": "http://dev2dev.bea.com/pub/advisory/263" }, { "name": "29041", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29041" }, { "name": "ADV-2008-0612", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/0612/references" }, { "name": "ADV-2008-0611", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2008/0611" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-0869", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in BEA WebLogic Workshop 8.1 through SP6 and Workshop for WebLogic 9.0 through 10.0 allows remote attackers to inject arbitrary web script or HTML via a \"framework defined request parameter\" when using WebLogic Workshop or Apache Beehive NetUI framework with page flows." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1019438", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1019438" }, { "name": "BEA08-189.00", "refsource": "BEA", "url": "http://dev2dev.bea.com/pub/advisory/263" }, { "name": "29041", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29041" }, { "name": "ADV-2008-0612", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/0612/references" }, { "name": "ADV-2008-0611", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2008/0611" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-0869", "datePublished": "2008-02-21T01:00:00", "dateReserved": "2008-02-20T00:00:00", "dateUpdated": "2024-08-07T08:01:39.719Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2007-5576 (GCVE-0-2007-5576)
Vulnerability from cvelistv5
Published
2007-10-18 21:00
Modified
2024-08-07 15:39
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
BEA Tuxedo 8.0 before RP392 and 8.1 before RP293, and WebLogic Enterprise 5.1 before RP174, echo the password in cleartext, which allows physically proximate attackers to obtain sensitive information via the (1) cnsbind, (2) cnsunbind, or (3) cnsls commands.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T15:39:13.505Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "45478", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/45478" }, { "name": "weblogic-tuxedo-information-disclosure(34290)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34290" }, { "name": "BEA07-158.00", "tags": [ "vendor-advisory", "x_refsource_BEA", "x_transferred" ], "url": "http://dev2dev.bea.com/pub/advisory/226" }, { "name": "ADV-2007-1813", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/1813" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-05-14T00:00:00", "descriptions": [ { "lang": "en", "value": "BEA Tuxedo 8.0 before RP392 and 8.1 before RP293, and WebLogic Enterprise 5.1 before RP174, echo the password in cleartext, which allows physically proximate attackers to obtain sensitive information via the (1) cnsbind, (2) cnsunbind, or (3) cnsls commands." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "45478", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/45478" }, { "name": "weblogic-tuxedo-information-disclosure(34290)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34290" }, { "name": "BEA07-158.00", "tags": [ "vendor-advisory", "x_refsource_BEA" ], "url": "http://dev2dev.bea.com/pub/advisory/226" }, { "name": "ADV-2007-1813", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/1813" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-5576", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "BEA Tuxedo 8.0 before RP392 and 8.1 before RP293, and WebLogic Enterprise 5.1 before RP174, echo the password in cleartext, which allows physically proximate attackers to obtain sensitive information via the (1) cnsbind, (2) cnsunbind, or (3) cnsls commands." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "45478", "refsource": "OSVDB", "url": "http://osvdb.org/45478" }, { "name": "weblogic-tuxedo-information-disclosure(34290)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34290" }, { "name": "BEA07-158.00", "refsource": "BEA", "url": "http://dev2dev.bea.com/pub/advisory/226" }, { "name": "ADV-2007-1813", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/1813" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-5576", "datePublished": "2007-10-18T21:00:00", "dateReserved": "2007-10-18T00:00:00", "dateUpdated": "2024-08-07T15:39:13.505Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2008-02-21 01:44
Modified
2025-04-09 00:30
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in BEA WebLogic Workshop 8.1 through SP6 and Workshop for WebLogic 9.0 through 10.0 allows remote attackers to inject arbitrary web script or HTML via a "framework defined request parameter" when using WebLogic Workshop or Apache Beehive NetUI framework with page flows.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
bea | weblogic_server | 9.0 | |
bea | weblogic_server | 9.1 | |
bea | weblogic_server | 9.2 | |
bea | weblogic_workshop | 8.1 | |
bea | weblogic_workshop | 8.1 | |
bea | weblogic_workshop | 8.1 | |
bea | weblogic_workshop | 8.1 | |
bea | weblogic_workshop | 8.1 | |
bea_systems | weblogic | 10.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bea:weblogic_server:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "3CA97F1A-49F7-4511-8959-D62155491DF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:9.1:*:*:*:*:*:*:*", "matchCriteriaId": "DCAAE8F1-CB25-4871-BE48-ABF7DFAD8AD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:9.2:*:*:*:*:*:*:*", "matchCriteriaId": "7BA8C449-ECD0-46E5-A7D6-740DE8DEE0EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_workshop:8.1:sp2:*:*:*:*:*:*", "matchCriteriaId": "AD6F9694-259F-4631-BC93-B1136F08E77E", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_workshop:8.1:sp3:*:*:*:*:*:*", "matchCriteriaId": "77624161-7740-4162-9C83-C0DFEA2BBCCC", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_workshop:8.1:sp4:*:*:*:*:*:*", "matchCriteriaId": "E785D039-3426-4C1F-BBA8-7C6D32FB141E", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_workshop:8.1:sp5:*:*:*:*:*:*", "matchCriteriaId": "D4B2A474-B6C4-47B6-8B20-8722A8C25238", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_workshop:8.1:sp6:*:*:*:*:*:*", "matchCriteriaId": "2FDBD7AF-51AC-48B9-A465-0C13B9230EE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea_systems:weblogic:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "66DD06E2-B659-4927-9DEA-8B88CA56D75D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in BEA WebLogic Workshop 8.1 through SP6 and Workshop for WebLogic 9.0 through 10.0 allows remote attackers to inject arbitrary web script or HTML via a \"framework defined request parameter\" when using WebLogic Workshop or Apache Beehive NetUI framework with page flows." }, { "lang": "es", "value": "Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en BEA WebLogic Workshop de 8.1 a SP6 y Workshop para WebLogic de 9.0 a 10.0 permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elecci\u00f3n a trav\u00e9s de un \"par\u00e1metro de petici\u00f3n de marco de trabajo definido\" cuando se utiliza WebLogic Workshop o el marco de trabajo Apache Beehive NetUI con flujos de p\u00e1gina." } ], "id": "CVE-2008-0869", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2008-02-21T01:44:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://dev2dev.bea.com/pub/advisory/263" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/29041" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1019438" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2008/0611" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2008/0612/references" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dev2dev.bea.com/pub/advisory/263" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/29041" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1019438" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/0611" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/0612/references" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-10-18 21:17
Modified
2025-04-09 00:30
Severity ?
Summary
BEA Tuxedo 8.0 before RP392 and 8.1 before RP293, and WebLogic Enterprise 5.1 before RP174, echo the password in cleartext, which allows physically proximate attackers to obtain sensitive information via the (1) cnsbind, (2) cnsunbind, or (3) cnsls commands.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bea:tuxedo:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "95C77782-600F-4BBB-B71D-C28FDD9AAF60", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:tuxedo:8.1:*:*:*:*:*:*:*", "matchCriteriaId": "30BF1224-40A6-454F-B6CF-3BEEBE3272B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_integration:8.1:*:*:*:*:*:*:*", "matchCriteriaId": "53E28DE8-4868-4DCE-8F8C-7967F2515D80", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_integration:8.1:sp2:*:*:*:*:*:*", "matchCriteriaId": "60231665-A976-4831-9419-AA332D3CC3D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_integration:8.1:sp3:*:*:*:*:*:*", "matchCriteriaId": "C67B3D8E-EBFF-4926-B696-9DC123A667EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_integration:8.1:sp4:*:*:*:*:*:*", "matchCriteriaId": "DA53F4D4-CABE-47A4-A900-840B5B933D5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_integration:8.1:sp5:*:*:*:*:*:*", "matchCriteriaId": "4CE99F33-A818-441D-A4AF-773C5422D992", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_integration:8.1:sp6:*:*:*:*:*:*", "matchCriteriaId": "FC355584-B0B1-4834-B2C9-4671AC4ED382", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_integration:9.2:*:*:*:*:*:*:*", "matchCriteriaId": "C64003CF-C562-491A-8430-B8D40CEC528C", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:5.1:*:enterprise:*:*:*:*:*", "matchCriteriaId": "AC966FC9-3ED4-4CCD-B1E6-74E8CC7CEBCD", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:6.1:*:express:*:*:*:*:*", "matchCriteriaId": "05AFBE78-C611-4EA2-8B00-5F8B61696CBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:6.1:sp1:express:*:*:*:*:*", "matchCriteriaId": "C3B7752C-B297-480A-B3FC-948EA081670C", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:6.1:sp2:express:*:*:*:*:*", "matchCriteriaId": "71892EC0-E6B1-4214-AC53-06489F711829", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:6.1:sp3:express:*:*:*:*:*", "matchCriteriaId": "696F52AE-FEB9-4090-872E-FDFD969F5604", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:6.1:sp4:express:*:*:*:*:*", "matchCriteriaId": "DCED03B6-7565-4F53-8D85-F3391BF66988", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:6.1:sp5:express:*:*:*:*:*", "matchCriteriaId": "B70F0353-635F-465B-A7E5-AF2D017AB008", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:6.1:sp6:express:*:*:*:*:*", "matchCriteriaId": "FED6AE20-974B-44A7-98C4-F69E6E33D9DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:6.1:sp7:express:*:*:*:*:*", "matchCriteriaId": "F77E777F-7EB5-4A08-9063-C772B49B5E36", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "F9C5AFCF-79D8-4005-B800-B0C6BD461276", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:7.0:*:express:*:*:*:*:*", "matchCriteriaId": "FBDF3AC0-0680-4EEE-898C-47D194667BE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:7.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "6828CE4B-91E8-4688-977F-DC7BC21131C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:7.0:sp1:express:*:*:*:*:*", "matchCriteriaId": "BBDB9094-78E8-4CBF-9F5F-321D5174F1EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:7.0:sp2:*:*:*:*:*:*", "matchCriteriaId": "E141AA86-C6D0-4FA8-9268-0FB0635DF9CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:7.0:sp2:express:*:*:*:*:*", "matchCriteriaId": "6FB8930F-C6D8-40B9-8D08-751F5B47229B", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:7.0:sp3:*:*:*:*:*:*", "matchCriteriaId": "893D9D88-43C4-4F9F-A364-0585DE6FA9E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:7.0:sp3:express:*:*:*:*:*", "matchCriteriaId": "D59F9859-7344-43F0-9348-E57FABB9E431", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:7.0:sp4:*:*:*:*:*:*", "matchCriteriaId": "D34E2925-DE2A-437F-B349-BD7103F4C37E", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:7.0:sp4:express:*:*:*:*:*", "matchCriteriaId": "0A4EC87D-EF83-48C5-B516-A6A482D9F525", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:7.0:sp5:*:*:*:*:*:*", "matchCriteriaId": "16E3F943-D920-4C0A-8545-5CF7D792011F", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:7.0:sp5:express:*:*:*:*:*", "matchCriteriaId": "6BBA04D4-BA2E-4495-85DE-38918A878012", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:7.0:sp6:*:*:*:*:*:*", "matchCriteriaId": "B46A3EBE-B268-427E-AAB5-62DDF255F1D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:7.0:sp6:express:*:*:*:*:*", "matchCriteriaId": "A3024422-1CA9-4E5D-80D1-2F4B57FDAEBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:7.0:sp7:*:*:*:*:*:*", "matchCriteriaId": "F5D61A68-E83A-4374-832A-C9A2FEA0AD6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:7.0:sp7:express:*:*:*:*:*", "matchCriteriaId": "596178D8-B7BB-4793-81C1-119ED353CF2D", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:7.0.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "74AE35FF-AC1C-435B-8CE9-F40AFFFA3A46", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:7.0.0.1:sp1:*:*:*:*:*:*", "matchCriteriaId": "32E8797D-1B62-4480-A79D-0345E65699E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:7.0.0.1:sp2:*:*:*:*:*:*", "matchCriteriaId": "2FC1486C-6AC4-44F7-9015-40FD4A341C38", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:7.0.0.1:sp3:*:*:*:*:*:*", "matchCriteriaId": "5485722F-5DE4-4CD4-865F-32585537F523", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:7.0.0.1:sp4:*:*:*:*:*:*", "matchCriteriaId": "3CCEDE54-97F3-457A-9886-5BD91C9AED2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:8.1:*:express:*:*:*:*:*", "matchCriteriaId": "ADED8968-EA9C-4F0E-AD2F-BC834F4D8A58", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:8.1:sp1:express:*:*:*:*:*", "matchCriteriaId": "F7560131-A6AC-4BBB-AA2D-C7C63AB51226", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:8.1:sp2:express:*:*:*:*:*", "matchCriteriaId": "893C2387-03E3-4F8E-9029-BC64C64239EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:8.1:sp3:express:*:*:*:*:*", "matchCriteriaId": "55661356-58E0-49D3-9C79-B4BB5EBE24CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:8.1:sp4:express:*:*:*:*:*", "matchCriteriaId": "107C2FC6-BC60-4817-8A21-14C81DA6DEF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:8.1:sp5:express:*:*:*:*:*", "matchCriteriaId": "24E0BA12-971C-4DC4-8ED2-9B7DCD6390E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "3CA97F1A-49F7-4511-8959-D62155491DF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:9.1:*:*:*:*:*:*:*", "matchCriteriaId": "DCAAE8F1-CB25-4871-BE48-ABF7DFAD8AD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:9.1:*:express:*:*:*:*:*", "matchCriteriaId": "17280B97-D499-434E-BD89-FD348E9E2E0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:9.2:*:*:*:*:*:*:*", "matchCriteriaId": "7BA8C449-ECD0-46E5-A7D6-740DE8DEE0EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_server:9.2:*:express:*:*:*:*:*", "matchCriteriaId": "B06BDF43-A534-4F38-813D-72F538549F6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_workshop:8.1:sp2:*:*:*:*:*:*", "matchCriteriaId": "AD6F9694-259F-4631-BC93-B1136F08E77E", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_workshop:8.1:sp3:*:*:*:*:*:*", "matchCriteriaId": "77624161-7740-4162-9C83-C0DFEA2BBCCC", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_workshop:8.1:sp4:*:*:*:*:*:*", "matchCriteriaId": "E785D039-3426-4C1F-BBA8-7C6D32FB141E", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_workshop:8.1:sp5:*:*:*:*:*:*", "matchCriteriaId": "D4B2A474-B6C4-47B6-8B20-8722A8C25238", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_workshop:8.1:sp6:*:*:*:*:*:*", "matchCriteriaId": "2FDBD7AF-51AC-48B9-A465-0C13B9230EE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:weblogic_portal:9.2:*:*:*:*:*:*:*", "matchCriteriaId": "B04835B2-7FE9-462B-B989-4031D43C9670", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "BEA Tuxedo 8.0 before RP392 and 8.1 before RP293, and WebLogic Enterprise 5.1 before RP174, echo the password in cleartext, which allows physically proximate attackers to obtain sensitive information via the (1) cnsbind, (2) cnsunbind, or (3) cnsls commands." }, { "lang": "es", "value": "BEA Tuxedo 8.0 anterior al RP392 y el 8.1 anterior al RP293 y el WebLogic Enterprise 5.1 anterior al RP174, muestra la contrase\u00f1a en texto claro, lo que permite a atacantes f\u00edsicamente pr\u00f3ximos obtener informaci\u00f3n sensible a trav\u00e9s de los comandos (1) cnsbind, (2) cnsunbind o (3) cnsls." } ], "evaluatorSolution": "More information can be found regarding patch information at:\r\nhttp://www.securityfocus.com/bid/23979/solution", "id": "CVE-2007-5576", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 6.8, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.1, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-10-18T21:17:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://dev2dev.bea.com/pub/advisory/226" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/45478" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/1813" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34290" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dev2dev.bea.com/pub/advisory/226" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/45478" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/1813" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34290" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2008-02-21 01:44
Modified
2025-04-09 00:30
Severity ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in BEA WebLogic Workshop allow remote attackers to inject arbitrary web script or HTML via an invalid action URI, which is not properly handled by NetUI page flows.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
bea | weblogic_workshop | 8.1 | |
bea | weblogic_workshop | 8.1 | |
bea | weblogic_workshop | 8.1 | |
bea | weblogic_workshop | 8.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bea:weblogic_workshop:8.1:sp2:*:*:*:*:*:*", "matchCriteriaId": "AD6F9694-259F-4631-BC93-B1136F08E77E", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_workshop:8.1:sp3:*:*:*:*:*:*", "matchCriteriaId": "77624161-7740-4162-9C83-C0DFEA2BBCCC", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_workshop:8.1:sp4:*:*:*:*:*:*", "matchCriteriaId": "E785D039-3426-4C1F-BBA8-7C6D32FB141E", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_workshop:8.1:sp5:*:*:*:*:*:*", "matchCriteriaId": "D4B2A474-B6C4-47B6-8B20-8722A8C25238", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in BEA WebLogic Workshop allow remote attackers to inject arbitrary web script or HTML via an invalid action URI, which is not properly handled by NetUI page flows." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades de ejecucion de comandos en sitios cruzados en BEA WebLogic Workshop, que permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elecci\u00f3n a trav\u00e9s de una acci\u00f3n URI no v\u00e1lida que no est\u00e1 manejada correctamente por el NetUI en el flujo de la p\u00e1gina." } ], "id": "CVE-2008-0866", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2008-02-21T01:44:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://dev2dev.bea.com/pub/advisory/258" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/29041" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1019441" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2008/0611" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://dev2dev.bea.com/pub/advisory/258" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/29041" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1019441" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2008/0611" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-05-16 01:19
Modified
2025-04-09 00:30
Severity ?
Summary
Directory traversal vulnerability in the Test View Console in BEA WebLogic Integration 9.2 before SP1 and WebLogic Workshop 8.1 SP2 through SP6, when "deployed in an exploded format," allows remote attackers to list a WebLogic Workshop Directory (wlwdir) parent directory via unspecified vectors.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
bea | weblogic_integration | 9.2 | |
bea | weblogic_workshop | 8.1 | |
bea | weblogic_workshop | 8.1 | |
bea | weblogic_workshop | 8.1 | |
bea | weblogic_workshop | 8.1 | |
bea | weblogic_workshop | 8.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bea:weblogic_integration:9.2:*:*:*:*:*:*:*", "matchCriteriaId": "C64003CF-C562-491A-8430-B8D40CEC528C", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_workshop:8.1:sp2:*:*:*:*:*:*", "matchCriteriaId": "AD6F9694-259F-4631-BC93-B1136F08E77E", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_workshop:8.1:sp3:*:*:*:*:*:*", "matchCriteriaId": "77624161-7740-4162-9C83-C0DFEA2BBCCC", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_workshop:8.1:sp4:*:*:*:*:*:*", "matchCriteriaId": "E785D039-3426-4C1F-BBA8-7C6D32FB141E", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_workshop:8.1:sp5:*:*:*:*:*:*", "matchCriteriaId": "D4B2A474-B6C4-47B6-8B20-8722A8C25238", "vulnerable": true }, { "criteria": "cpe:2.3:a:bea:weblogic_workshop:8.1:sp6:*:*:*:*:*:*", "matchCriteriaId": "2FDBD7AF-51AC-48B9-A465-0C13B9230EE3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in the Test View Console in BEA WebLogic Integration 9.2 before SP1 and WebLogic Workshop 8.1 SP2 through SP6, when \"deployed in an exploded format,\" allows remote attackers to list a WebLogic Workshop Directory (wlwdir) parent directory via unspecified vectors." }, { "lang": "es", "value": "Vulnerabilidad de salto de directorio en Test View Console de BEA WebLogic Integration 9.2 anterior a SP1 y WebLogic Workshop 8.1 SP2 hasta SP6, cuando es \"desplegado en formato expandido\" permite a atacantes remotos listar un directorio padre de WebLogic Workshop Directory (wlwdir) a trav\u00e9s de vectores sin especificar." } ], "evaluatorSolution": "The vendor has addressed this issue through the following product releases: \r\n\r\nBEA WebLogic Server patches :\r\nhttp://commerce.bea.com/showallversions.jsp?family=WLS\r\n\r\nBEA WebLogic Platform patches :\r\nhttp://commerce.bea.com/showallversions.jsp?family=WLP \r\n", "id": "CVE-2007-2705", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 7.8, "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-05-16T01:19:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://dev2dev.bea.com/pub/advisory/239" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/36063" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1018059" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/1815" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34281" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://dev2dev.bea.com/pub/advisory/239" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/36063" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1018059" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/1815" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34281" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }