what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

BEA05-V0100.txt

BEA05-V0100.txt
Posted Aug 14, 2005
Site appsecinc.com

BEA WebLogic Server versions 7.0 and 8.1 suffer from a cross site scripting vulnerability in their error page.

tags | exploit, xss
SHA-256 | 73927fc23663cbc4dccf3dd111e9b4e9da9e01ab4db88f32a6aff8a785e1dbec

BEA05-V0100.txt

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

BEA WebLogic Administration Console error page cross-site scripting
vulnerability

AppSecInc Team SHATTER Security Advisory BEA05-V0100
http://www.appsecinc.com/resources/alerts/general/BEA-001.html
May 27, 2005

Affected versions: BEA WebLogic Server 7.0 and 8.1

Risk level: High

Credits: This vulnerability was discovered and researched by Agustín
Martínez Fayó of Argeniss for Application Security Inc.

Background:
The Administration Console is a web browser-based, graphical user
interface used to manage a WebLogic Server domain. The Administration
Console supports a full range of product administrative tasks. A
cross-site scripting vulnerability exists in the login page of the
Console.

Details:
Cross-site scripting vulnerabilities occur when an attacker tricks a
legitimate web application into sending malicious code, generally in
the form of a script, to an unsuspecting end user. The attack usually
involves crafting a hyperlink with malicious script code embedded
within it. A valid user is likely to click on this link since it
points to a resource on a trusted domain. The link can be posted on a
web page, or sent in an instant message, or email. Clicking the link
executes the attacker-injected code in the context of the trusted web
application. Typically, the code steals session cookies, which can
then be used to impersonate a valid user.

Parameters provided to the error page of the Administration Console
are vulnerable to cross-site scripting attacks. User-supplied input to
these parameters is returned without proper sanitization, allowing a
malicious attacker to inject arbitrary scripting code.

To get the session cookie a remote attacker could send this link to
the administrator:
http://vulnerablesite:7001/console/a?=<script>alert(document.cookie)</script>

Impact:
Attackers can steal administrator's session cookies and password,
thereby allowing the attacker to impersonate the valid user.

Workaround:
There is no workaround for this issue.

Vendor Status:
Vendor was contacted and a patch was released.

Fix:
For BEA WebLogic Server and WebLogic Express 8.1 upgrade to Service
Pack 4. Apply the patch on top of it located at
ftp://ftpna.bea.com/pub/releases/security/CR202495_810sp4.jar on top
of the service packs.
For BEA WebLogic Server and WebLogic Express 7.0 upgrade to Service
Pack 6. Apply the patch located at
ftp://ftpna.bea.com/pub/releases/security/CR214457_700sp6.jar on top
of the service packs.

Links:
Application Security, Inc advisory:
http://www.appsecinc.com/resources/alerts/general/BEA-001.html
BEA Advisory: http://dev2dev.bea.com/pub/advisory/130

- --
_____________________________________________
Application Security, Inc.
www.appsecinc.com
AppSecInc is the leading provider of database security solutions for
the enterprise. AppSecInc products proactively secure enterprise
applications at more than 300 organizations around the world by
discovering, assessing, and protecting the database against rapidly
changing security threats. By securing data at its source, we enable
organizations to more confidently extend their business with
customers, partners and suppliers. Our security experts, combined with
our strong support team, deliver up-to-date application safeguards
that minimize risk and eliminate its impact on business.

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.0 (MingW32)

iD8DBQFCl2ZS/0w1dSVRt4URAjbbAJ9sjbn1lxaldQGxjVgceKakOspAkQCgq+Ur
MyVlFkq5xzvNLsoO3F36C5k=
=+vls
-----END PGP SIGNATURE-----

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close