安全研究
安全漏洞
BEA WebLogic Server/Express EJB非法URL模式绕过漏洞
发布日期:2004-04-20
更新日期:2004-04-26
受影响系统:
BEA Systems WebLogic Express 8.1 SP1不受影响系统:
BEA Systems WebLogic Express 8.1
BEA Systems WebLogic Express 7.0 SP4
BEA Systems WebLogic Express 7.0 SP3
BEA Systems WebLogic Express 7.0 SP2
BEA Systems WebLogic Express 7.0 SP1
BEA Systems WebLogic Express 6.1 SP6
BEA Systems WebLogic Express 6.1 SP5
BEA Systems WebLogic Express 6.1 SP4
BEA Systems WebLogic Express 6.1 SP3
BEA Systems WebLogic Express 6.1 SP2
BEA Systems WebLogic Express 6.1 SP1
BEA Systems WebLogic Express 6.1
BEA Systems Weblogic Server 8.1 SP1
BEA Systems Weblogic Server 8.1
BEA Systems Weblogic Server 7.0 SP4
BEA Systems Weblogic Server 7.0 SP3
BEA Systems Weblogic Server 7.0 SP2
BEA Systems Weblogic Server 7.0 SP1
BEA Systems Weblogic Server 7.0
BEA Systems Weblogic Server 6.1 SP6
BEA Systems Weblogic Server 6.1 SP5
BEA Systems Weblogic Server 6.1 SP4
BEA Systems Weblogic Server 6.1 SP3
BEA Systems Weblogic Server 6.1 SP2
BEA Systems Weblogic Server 6.1 SP1
BEA Systems Weblogic Server 6.1
BEA Systems WebLogic Express 7.0
- HP HP-UX 11i
- HP HP-UX 11.0
- IBM AIX 4.3.3
- Microsoft Windows NT 4.0 SP6a
- Microsoft Windows NT 4.0 SP6
- Microsoft Windows NT 4.0 SP5
- Microsoft Windows NT 4.0 SP4
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional
- Microsoft Windows 2000 Datacenter Server SP2
- Microsoft Windows 2000 Datacenter Server SP1
- Microsoft Windows 2000 Datacenter Server
- Microsoft Windows 2000 Advanced Server SP2
- Microsoft Windows 2000 Advanced Server SP1
- Microsoft Windows 2000 Advanced Server
- RedHat Linux 7.1
- RedHat Linux 6.2
- Sun Solaris 8.0
- Sun Solaris 7.0
- Sun Solaris 2.6
BEA Systems WebLogic Express 8.1 SP2描述:
BEA Systems WebLogic Express 7.0 SP5
BEA Systems Weblogic Server 8.1 SP2
BEA Systems Weblogic Server 7.0 SP5
BUGTRAQ ID: 10184
CVE(CAN) ID: CVE-2004-0711
BEA Systems WebLogic包含多种应用系统集成方案,包括Server/Express/Integration等。
WebLogic Server和WebLogic Express在处理非法URI匹配时存在问题,远程攻击者利用这个漏洞在某些情况下访问敏感资源。
在WebLogic Server 6.x版本中,对于'/mydir*'的不合法URL模式一般处理为合法的/mydir/*模式,如果WebLogic Server 6.x版本Web应用程序使用的非法语法移植到WebLogic Server 7.x版本或之后版本,对非法语法的保护将失效,导致部分保护资源可被访问。
<*来源:BEA System SECURITY ADVISORY
链接:http://dev2dev.bea.com/resourcelibrary/advisoriesnotifications/BEA04_56.00.jsp
*>
建议:
厂商补丁:
BEA Systems
-----------
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:
BEA Systems WebLogic 6.1 SP6:
BEA Systems Patch CR128888_61sp6.jar
ftp://ftpna.beasys.com/pub/releases/security/CR128888_61sp6.jar
BEA Systems Weblogic 8.1 SP 2:
BEA Systems Patch CR128888_81sp2.jar
ftp://ftpna.beasys.com/pub/releases/security/CR128888_81sp2.jar
浏览次数:8094
严重程度:0(网友投票)
绿盟科技给您安全的保障