JVN#81667751
Directory traversal vulnerability in WebLogic Server and WebLogic Express plug-ins
Overview
WebLogic Server and WebLogic Express are application servers provided by Oracle (formerly BEA Systems, Inc.).
Plug-ins included in WebLogic Server and WebLogic Express contain a directory traversal vulnerability.
Products Affected
Following plug-ins included in WebLogic Sever and WebLogic Express before 2008 July 15.- Plug-in for Apache
- Plug-in for NSAPI(Netscape Server Application Program Interface)
- Plug-in for ISAPI(Internet Server Application Program Interface)
Description
WebLogic Server and WebLogic Express are application servers based on Java Platform Enterprise Edition 5 (JavaEE5) and provided by Oracle (formerly BEA Systems, Inc.). Plug-ins for Apache, Sun, and Microsoft IIS web servers which are included in WebLogic Server and WebLogic Express contain a directory traversal vulnerability.
Impact
A remote attacker could, without authentication, view files on the server where either WebLogic Server or WebLogic Express is installed. This could lead to unintentional disclosure of file contents.
Solution
Update the Software
Apply the latest update provided by the vendor.
For more information, refer to the vendor's website.
Vendor Status
References
JPCERT/CC Addendum
Due to the acquisition of BEA Systems, Inc. by Oracle on 2008 April 29, any security related information of BEA products will be included in Oracle Critical Patch Updates. For more information, please refer to the following pages.Vulnerability Analysis by JPCERT/CC
Analyzed on 2008.07.18
Measures | Conditions | Severity |
---|---|---|
Access Required | Routed - can be attacked over the Internet using packets |
|
Authentication | None - anonymous or no authentication (IP addresses do not count) |
|
User Interaction Required | None - the vulnerability can be exploited without an honest user taking any action |
|
Exploit Complexity | Low - little to no expertise and/or luck required to exploit (cross-site scripting) |
|
Credit
Hirofumi Oka of NRI SecureTechnologies,Ltd. reported this vulnerability to IPA.
JPCERT/CC coordinated with the vendor under Information Security Early Warning Partnership.
Other Information
JPCERT Alert | |
JPCERT Reports | |
CERT Advisory | |
CPNI Advisory | |
TRnotes | |
CVE |
CVE-2008-2579 |
JVN iPedia |
JVNDB-2008-000040 |