The URL pattern matching feature in BEA WebLogic Server 6.x matches illegal patterns ending in "*" as wildcards as if they were the legal "/*" pattern, which could cause WebLogic 7.x to allow remote attackers to bypass intended access restrictions because the illegal patterns are properly rejected.
References
Link | Resource |
---|---|
http://dev2dev.bea.com/resourcelibrary/advisoriesnotifications/BEA04_56.00.jsp | |
http://www.kb.cert.org/vuls/id/184558 | Third Party Advisory US Government Resource |
http://www.securityfocus.com/bid/10184 | Patch Vendor Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/15927 |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2004-07-21T04:00:00
Updated: 2017-07-10T14:57:01
Reserved: 2004-07-20T00:00:00
Link: CVE-2004-0711
JSON object: View
NVD Information
Status : Modified
Published: 2004-07-27T04:00:00.000
Modified: 2017-07-11T01:30:24.247
Link: CVE-2004-0711
JSON object: View
Redhat Information
No data.
CWE