Plugin ID | 228 |
Plugin name | BEA WebLogic prior 8.1 multiple vulnerabilities |
Plugin filename | BEA WebLogic prior 8.1 multiple vulnerabilities.plugin |
Plugin filesize | 3645 bytes |
Plugin family | CGI |
Plugin created name | Marc Ruef |
Plugin created email | marc dot ruef at computec dot ch |
Plugin created web | http://www.computec.ch |
Plugin created company | computec.ch |
Plugin created date | 2004/09/15 |
Plugin updated name | Marc Ruef |
Plugin updated email | marc dot ruef at computec dot ch |
Plugin updated web | http://www.computec.ch |
Plugin updated company | computec.ch |
Plugin updated date | 2004/11/14 |
Plugin version | 2.0 |
Plugin changelog | Corrected the plugin structure and added the accuracy values in 1.1. Improved the pattern matching and introduced the plugin changelog in 2.0 |
Plugin protocol | tcp |
Plugin port | 80 |
Plugin procedure detection | open|send HEAD / HTTP/1.0\n\n|sleep|close|pattern_exists HTTP/#.# ### *WebLogic*[0-7].* OR HTTP/#.# ### *WebLogic*8.[0-1]* |
Plugin detection accuracy | 90 |
Plugin comment | I don't know how to detect the installed service pack accurately. Perhaps I will split this plugin in the future to detect the different flaws seperately. |
Bug published email | info at bea dot com |
Bug published web | http://www.bea.com |
Bug published company | BEA Systems Inc. |
Bug published date | 2004/09/15 |
Bug advisory | http://dev2dev.bea.com/resourcelibrary/advisoriesnotifications/ |
Bug affected | BEA WebLogic prior 8.1 with SP3 |
Bug not affected | BEA WebLogic 8.1 with SP3 and newer or other solutions |
Bug vulnerability class | Configuration |
Bug description | The remote host is running BEA WebLogic which is older than version 8.1 There were more than 8 different vulnerabilities published for this version. An attacker may be able to start a denial of service attack or to get elevated privileges. |
Bug solution | If the web server is not used it should be de-installed or de-activated. Install the newest patch or bugfix to solve the problem or upgrade to the latest software version which is not vulnerable anymore. Additionally limit unwanted connections and communications with firewalling. |
Bug fixing time | Approx. 2 hours |
Bug exploit availability | Maybe |
Bug exploit url | http://www.securityfocus.com/bid/11168/exploit/ |
Bug remote | Yes |
Bug local | Yes |
Bug severity | High |
Bug popularity | 8 |
Bug simplicity | 7 |
Bug impact | 9 |
Bug risk | 8 |
Bug Nessus risk | High |
Bug check tools | Nessus is able to do the same check a bit more accurate. |
Source SecurityFocus BID | 11168 |
Source Secunia ID | 12524 |
Source scipID | 831 |
Source Nessus ID | 14722 |
Source Literature | Hacking Exposed: Network Security Secrets & Solutions, Stuart McClure, Joel Scambray and George Kurtz, February 25, 2003, 4th Edition, McGraw-Hill Osborne Media, ISBN 0072227427 |
Source Misc. | http://secunia.com/product/1360/ |