what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Secunia Security Advisory 29041

Secunia Security Advisory 29041
Posted Feb 21, 2008
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Some vulnerabilities, security issues, and a weakness have been reported in various BEA WebLogic products, which can be exploited by malicious users to conduct script insertion attacks, and by malicious people to conduct session fixation, cross-site scripting, or brute force attacks, disclose sensitive information, or to bypass certain security restrictions.

tags | advisory, vulnerability, xss
SHA-256 | 064bd67a0ebf657e0dac2b37f9d572783ba1f58f1b1b745fb31c899d681e78c4

Secunia Security Advisory 29041

Change Mirror Download


----------------------------------------------------------------------

A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI
has been released. The new version includes many new and advanced
features, which makes it even easier to stay patched.

Download and test it today:
https://psi.secunia.com/

Read more about this new version:
https://psi.secunia.com/?page=changelog

----------------------------------------------------------------------

TITLE:
BEA WebLogic Products Multiple Vulnerabilities

SECUNIA ADVISORY ID:
SA29041

VERIFY ADVISORY:
http://secunia.com/advisories/29041/

CRITICAL:
Moderately critical

IMPACT:
Hijacking, Security Bypass, Cross Site Scripting, Brute force,
Exposure of system information, Exposure of sensitive information

WHERE:
>From remote

SOFTWARE:
BEA WebLogic Workshop 8.x
http://secunia.com/product/17676/
BEA WebLogic Portal 10.x
http://secunia.com/product/17674/
BEA WebLogic Server 9.x
http://secunia.com/product/5822/
BEA WebLogic Server 8.x
http://secunia.com/product/1360/
BEA WebLogic Server 7.x
http://secunia.com/product/754/
BEA WebLogic Server 6.x
http://secunia.com/product/753/
BEA WebLogic Server 10.x
http://secunia.com/product/17671/
BEA WebLogic Portal 9.x
http://secunia.com/product/13273/
BEA WebLogic Portal 8.x
http://secunia.com/product/5149/
BEA WebLogic Express 9.x
http://secunia.com/product/5823/
BEA WebLogic Express 8.x
http://secunia.com/product/1843/
BEA WebLogic Express 7.x
http://secunia.com/product/1282/
BEA WebLogic Express 6.x
http://secunia.com/product/1281/
BEA WebLogic Express 10.x
http://secunia.com/product/17672/
BEA Workshop for WebLogic 9.x
http://secunia.com/product/17677/
BEA Workshop for WebLogic 10.x
http://secunia.com/product/17678/

DESCRIPTION:
Some vulnerabilities, security issues, and a weakness have been
reported in various BEA WebLogic products, which can be exploited by
malicious users to conduct script insertion attacks, and by malicious
people to conduct session fixation, cross-site scripting, or brute
force attacks, disclose sensitive information, or to bypass certain
security restrictions.

1) An error in the processing of requests within the
"HttpClusterServlet" and "HttpProxyServlet" proxy servlets, when
configured with the "SecureProxy" parameter, can potentially be
exploited to gain access to certain administrative resources that are
only accessible to an administrator.

This is related to vulnerability #2 in:
SA25284

The following versions of WebLogic Server and WebLogic Express are
affected:
* WebLogic Server 9.1 on all platforms
* WebLogic Server 9.0 on all platforms
* WebLogic Server 8.1 released through Service Pack 5, on all
platforms
* WebLogic Server 7.0 released through Service Pack 7, on all
platforms
* WebLogic Server 6.1 released through Service Pack 7, on all
platforms


2) Input to unspecified parameters is not properly sanitised before
being returned to the user. This can be exploited to execute
arbitrary HTML and script code in a user's browser session in context
of an affected site.

This is related to vulnerability #6 in:
SA15486

The vulnerability is reported in the following versions of WebLogic
Server and WebLogic Express:
* WebLogic Server 10.0 released through Maintenance Pack 1, on all
platforms
* WebLogic Server 9.2 released through Maintenance Pack 2, on all
platforms
* WebLogic Server 9.1 GA release, on all platforms.
* WebLogic Server 9.0 GA release, on all platforms.
* WebLogic Server 8.1 released through Service Pack 6, on all
platforms.
* WebLogic Server 7.0 released through Service Pack 7, on all
platforms.
* WebLogic Server 6.1 released through Service Pack 7, on all
platforms.

3) A weakness is caused due to an error in the account lockout, which
can be exploited to perform brute force attacks.

The weakness is reported in the following version of WebLogic Server
and WebLogic Express:
* WebLogic Server 10.0 released through Maintenance Pack 1, on all
platforms
* WebLogic Server 9.2 released through Maintenance Pack 2, on all
platforms
* WebLogic Server 9.1 on all platforms
* WebLogic Server 9.0 on all platforms
* WebLogic Server 8.1 released through Service Pack 6, on all
platforms
* WebLogic Server 7.0 released through Service Pack 7, on all
platforms

4) An error exists in the handling of sessions and can be exploited
to hijack a user's session by tricking the user into logging in after
following a specially crafted link.

Successful exploitation requires access to the server's console login
page.

The vulnerability is reported in the following version of WebLogic
Server and WebLogic Express:
* WebLogic Server 10.0, on all platforms
* WebLogic Server 9.2 released through Maintenance Pack 1, on all
platforms
* WebLogic Server 8.1 Service Pack 4 through Service Pack 6, on all
platforms

5) Unspecified input passed to the WebLogic Server Administration
Console is not properly sanitised before being returned to the user.
This can be exploited to execute arbitrary HTML and script code in an
administrative user's browser session in context of an affected site.

The vulnerability is reported in the following version of WebLogic
Server and WebLogic Express:
* WebLogic Server 10.0, on all platforms
* WebLogic Server 9.2 released through Maintenance Pack 1, on all
platforms
* WebLogic Server 9.1 on all platforms
* WebLogic Server 9.0 on all platforms

6) An unspecified error in the distributed queue feature can be
exploited to bypass the security policies defined on a protected
distributed queue.

The vulnerability is reported in the following version of WebLogic
Server and WebLogic Express:
* WebLogic Server 10 with no maintenance packs, on all platforms
* WebLogic Server 9.2 released through Maintenance Pack 1, on all
platforms
* WebLogic Server 9.1 on all platforms
* WebLogic Server 9.0 on all platforms

7) An unspecified error can be exploited to receive messages from a
standalone (physical) JMS Topic destination or a member of a secured
Distributed Topic member destination.

The vulnerability is reported in the following version of WebLogic
Server and WebLogic Express:
* WebLogic Server 10 with no maintenance packs, on all platforms
* WebLogic Server 9.2 released through Maintenance Pack 1, on all
platforms
* WebLogic Server 9.1 on all platforms
* WebLogic Server 9.0 on all platforms

8) A security issue in the handling of content portlets can result in
users gaining access to content portlets that are restricted.

9) An error in the handling of https sessions in the Portal
Administration Console can lead to redirects via http.

The security issues are reported in the following version of WebLogic
Portal:
* WebLogic Portal 10.0, on all platforms
* WebLogic Portal 9.2 released through Maintenance Pack 1, on all
platforms

10) An unspecified error in the processing of HTML request headers
can potentially be exploited to get unauthorised access to certain
application servlets.

The vulnerability is reported in the following version of WebLogic
Server and WebLogic Express:
* WebLogic Server 10.0 on all platforms
* WebLogic 9.2 released through 9.2 Maintenance Pack 1, on all
platforms
* WebLogic Server 9.1 on all platforms
* WebLogic Server 9.0 on all platforms
* WebLogic Server 8.1 released through Service Pack 6, on all
platforms
* WebLogic Server 7.0 released through Service Pack 7, on all
platforms
* WebLogic Server 6.1 released through Service Pack 7, on all
platforms

11) Input passed to parameters to the NetUI framework is not properly
sanitised before being returned to the user. This can be exploited to
execute arbitrary HTML and script code in a user's browser session
context of an affected site.

The vulnerability is reported in the following versions of WebLogic
Workshop and BEA Workshop for WebLogic:
* BEA Workshop for WebLogic 10.0, on all platforms
* BEA Workshop for WebLogic 9.2 released through Maintenance Pack 1,
on all platforms
* BEA Workshop for WebLogic 9.1, on all platforms
* BEA Workshop for WebLogic 9.0, on all platforms
* WebLogic Workshop 8.1 released through Service Pack 6, on all
platforms

12) Database passwords are stored in clear-text in the "config.xml"
file and may expose the database password for the RDBMS
Authentication provider to malicious users.

Successful exploitation requires that the site has configured the
RDBMS Authentication provider.

This is related to vulnerability #1 in:
SA18593

The security issue is reported in the following versions of WebLogic
Portal:
* WebLogic Portal 8.1 released through Service Pack 3, on all
platforms.
* WebLogic Portal 7.0 Service Pack 4 through Service Pack 7, on all
platforms.

13) Input passed to unspecified parameters to certain Groupspace
functions is not properly sanitised before being used. This can be
exploited to insert arbitrary HTML and script code, which will be
executed in another user's browser session in context of an affected
site when the malicious data is viewed.

The vulnerability is reported in the following versions of WebLogic
Portal:
* WebLogic Portal 10.0, on all platforms
* WebLogic Portal 9.2 released through Maintenance Pack 1, on all
platforms

14) Input passed to unspecified parameters to web applications with
page flows using the WebLogic Workshop NetUI framework is not
properly sanitised before being returned to the user. This can be
exploited to execute arbitrary HTML and script code in a user's
browser session in context of an affected site.

The vulnerability is reported in following versions of WebLogic
Workshop:
* WebLogic Workshop 8.1 released through Service Pack 5, on all
platforms

15) An unspecified error in the handling of entitlements can be
exploited to bypass an entitlement on an instance of a floatable WLP
portlet.

The vulnerability is reported in the following version of WebLogic
Portal:
* WebLogic Portal 8.1 released through Service Pack 6, on all
platforms

16) A security issue in the handling of entitlements on pages can
result in the removal of any entitlement policies without
notification.

The security issue is reported in the following versions of WebLogic
Portal:
WebLogic Portal 8.1 Service Pack 3 through Service Pack 6, on all
platforms.

17) An unspecified error within BEA’s web server plugin can
potentially be exploited to crash the Sun, IIS, or Apache web server
process via a specially crafted URL.

The vulnerability is reported in Plug-ins for WebLogic Server and
WebLogic Express dated prior to November 2007.

SOLUTION:
Apply patches (see vendor advisories for details).

PROVIDED AND/OR DISCOVERED BY:
The vendor credits:
2) * ACROS Security
* DV Bern AG
* Application Security Inc
* GomoR
3) Ramón Pinuaga, S21sec
4) Mitja Kolsek, ACROS Security
5) Sasa Kos and Mitja Kolsek, ACROS Security

ORIGINAL ADVISORY:
BEA:
http://dev2dev.bea.com/pub/advisory/256
http://dev2dev.bea.com/pub/advisory/257
http://dev2dev.bea.com/pub/advisory/258
http://dev2dev.bea.com/pub/advisory/261
http://dev2dev.bea.com/pub/advisory/262
http://dev2dev.bea.com/pub/advisory/263
http://dev2dev.bea.com/pub/advisory/264
http://dev2dev.bea.com/pub/advisory/265
http://dev2dev.bea.com/pub/advisory/266
http://dev2dev.bea.com/pub/advisory/267
http://dev2dev.bea.com/pub/advisory/268
http://dev2dev.bea.com/pub/advisory/269
http://dev2dev.bea.com/pub/advisory/270
http://dev2dev.bea.com/pub/advisory/271
http://dev2dev.bea.com/pub/advisory/273
http://dev2dev.bea.com/pub/advisory/274
http://dev2dev.bea.com/pub/advisory/275

OTHER REFERENCES:
SA15486:
http://secunia.com/advisories/15486/

SA18593:
http://secunia.com/advisories/18593/

SA25284:
http://secunia.com/advisories/25284/

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    0 Files
  • 11
    Sep 11th
    0 Files
  • 12
    Sep 12th
    0 Files
  • 13
    Sep 13th
    0 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close