exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

ProCheckUp Security Advisory 2006.8

ProCheckUp Security Advisory 2006.8
Posted Dec 4, 2007
Authored by Adrian Pastor, ProCheckUp, Jan Fry | Site procheckup.com

BEA Plumtree Portal is vulnerable to a internal hostname disclosure vulnerability.

tags | advisory
SHA-256 | 866b56dd83ba8330356f8847ee9d66d1be2f67a4336cc14f44ee0a485a6a593a

ProCheckUp Security Advisory 2006.8

Change Mirror Download
PR06-08: BEA Plumtree portal internal hostname disclosure vulnerability

Description:

BEA Plumtree portal is vulnerable to a internal hostname disclosure vulnerability.

The internal hostname of the server hosting BEA Plumtree portal is always included at the bottom of every requested HTML page within HTML comments.

Date Found: 12th September 2006

Vendor contacted: 18th May 2007

Vulnerable: BEA Plumtree 5.0.2, 5.0.3, 5.0.4, 6.0.1.218452 and possibly other versions.

Severity: Low

Authors: Adrian Pastor and Jan Fry from ProCheckUp Ltd (www.procheckup.com)

ProCheckUp thanks BEA for working with us.

Vendor Status: Confirmed

CVE Candidate: Not assigned

Proof of concept:

The following is an example of the internal hostname of Plumtree server disclosed within HTML comments:

<!--Hostname: websvr01-->

Consequences:

This information could be useful to a malicious user attempting to gain illegal access to resources on internal systems.

By following internal hostname naming conventions, an attacker could predict other internal hostnames as well. For instance, if Plumtree portal is running on a server with an internal hostname of websvr01, an attacker could predict other internal hostnames such as websvr01, websvr02, websvr03 and so on.

Fix:

This has been addressed in AquaLogic Interaction 6.1. MP1. This can also be addressed by making config changes in ALUI 6.x versions.

References:

http://www.procheckup.com/Vulnerability_2007.php
http://dev2dev.bea.com/pub/advisory/251
http://www.plumtree.com/
Login or Register to add favorites

File Archive:

July 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    52 Files
  • 2
    Jul 2nd
    0 Files
  • 3
    Jul 3rd
    0 Files
  • 4
    Jul 4th
    11 Files
  • 5
    Jul 5th
    8 Files
  • 6
    Jul 6th
    8 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    0 Files
  • 9
    Jul 9th
    0 Files
  • 10
    Jul 10th
    0 Files
  • 11
    Jul 11th
    0 Files
  • 12
    Jul 12th
    0 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close