Vulnerabilities > CVE-2003-1224 - Unspecified vulnerability in BEA Weblogic Server 7.0/7.0.0.1
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN bea
nessus
Summary
Weblogic.admin for BEA WebLogic Server and Express 7.0 and 7.0.0.1 displays the JDBCConnectionPoolRuntimeMBean password to the screen in cleartext, which allows attackers to read a user's password by physically observing ("shoulder surfing") the screen.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 22 |
Nessus
NASL family | CGI abuses |
NASL id | WEBLOGIC_CLEARTEXT_PASSWORD.NASL |
description | The remote web server is running WebLogic 7.0 or 7.0.0.1. There is a bug in these versions that could allow a local attacker to recover a WebLogic password if the screen of the WebLogic server is visible. In addition, a local user may be able to view cryptographic secrets, thereby facilitating cracking of encrypted passwords. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 11627 |
published | 2003-05-14 |
reporter | This script is Copyright (C) 2003-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/11627 |
title | WebLogic Multiple Method Cleartext Password Disclosure |
code |
|