CVE-2005-1747
Description
Multiple cross-site scripting (XSS) vulnerabilities in BEA WebLogic Server and Express 8.1 through Service Pack 4, and 7.0 through Service Pack 6, allow remote attackers to inject arbitrary web script or HTML, and possibly gain administrative privileges, via the (1) j_username or (2) j_password parameters in the login page (LoginForm.jsp), (3) parameters to the error page in the Administration Console, (4) unknown vectors in the Server Console while the administrator has an active session to obtain the ADMINCONSOLESESSION cookie, or (5) an alternate vector in the Server Console that does not require an active session but also leaks the username and password.
Affected products
76cpe:2.3:a:bea:weblogic_server:6.0:*:*:*:*:*:*:*+ 74 more
- cpe:2.3:a:bea:weblogic_server:6.0:*:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:6.0:*:express:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:6.0:sp1:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:6.0:sp1:express:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:6.0:sp1:win32:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:6.0:sp2:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:6.0:sp2:express:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:6.0:sp2:win32:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:6.0:*:win32:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:6.1:*:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:6.1:*:express:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:6.1:sp1:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:6.1:sp1:express:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:6.1:sp1:win32:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:6.1:sp2:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:6.1:sp2:express:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:6.1:sp2:win32:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:6.1:sp3:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:6.1:sp3:express:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:6.1:sp3:win32:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:6.1:sp4:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:6.1:sp4:express:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:6.1:sp4:win32:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:6.1:sp5:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:6.1:sp5:express:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:6.1:sp5:win32:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:6.1:sp6:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:6.1:sp6:win32:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:6.1:*:win32:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:7.0:*:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:7.0.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:7.0.0.1:*:express:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:7.0.0.1:sp1:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:7.0.0.1:sp1:express:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:7.0.0.1:sp1:win32:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:7.0.0.1:sp2:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:7.0.0.1:sp2:express:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:7.0.0.1:sp2:win32:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:7.0.0.1:sp3:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:7.0.0.1:sp3:express:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:7.0.0.1:sp4:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:7.0.0.1:sp4:express:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:7.0.0.1:*:win32:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:7.0:*:express:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:7.0:sp1:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:7.0:sp1:express:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:7.0:sp1:win32:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:7.0:sp2:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:7.0:sp2:express:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:7.0:sp2:win32:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:7.0:sp3:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:7.0:sp3:express:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:7.0:sp3:win32:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:7.0:sp4:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:7.0:sp4:express:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:7.0:sp4:win32:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:7.0:sp5:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:7.0:sp5:express:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:7.0:sp5:win32:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:7.0:*:win32:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:8.1:*:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:8.1:*:express:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:8.1:sp1:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:8.1:sp1:express:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:8.1:sp1:win32:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:8.1:sp2:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:8.1:sp2:express:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:8.1:sp2:win32:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:8.1:sp3:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:8.1:sp3:express:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:8.1:sp3:win32:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:8.1:sp4:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:8.1:sp4:express:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:8.1:sp4:win32:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:8.1:*:win32:*:*:*:*:*
- cpe:2.3:a:oracle:weblogic_portal:8.0:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
13- dev2dev.bea.com/pub/advisory/130nvdVendor Advisory
- secunia.com/advisories/15486nvdVendor Advisory
- marc.infonvd
- marc.infonvd
- marc.infonvd
- marc.infonvd
- securitytracker.com/idnvd
- www.acrossecurity.com/aspr/ASPR-2005-05-24-1-PUB.txtnvd
- www.acrossecurity.com/aspr/ASPR-2005-05-24-2-PUB.txtnvd
- www.appsecinc.com/resources/alerts/general/BEA-001.htmlnvd
- www.appsecinc.com/resources/alerts/general/BEA-002.htmlnvd
- www.securityfocus.com/bid/13717nvd
- www.vupen.com/english/advisories/2005/0607nvd
News mentions
0No linked articles in our index yet.