Vulnerabilities > CVE-2004-1757 - Unspecified vulnerability in BEA Weblogic Server 6.1/7.0/8.1

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
bea
nessus

Summary

BEA WebLogic Server and Express 8.1, SP1 and earlier, stores the administrator password in cleartext in config.xml, which allows local users to gain privileges.

Vulnerable Configurations

Part Description Count
Application
Bea
46

Nessus

NASL familyCGI abuses
NASL idBEA_PASSWORD.NASL
descriptionThe remote web server is running WebLogic. BEA WebLogic Server and WebLogic Express are reportedly may allow disclosure of Operator or Admin passwords. An attacker who has interactive access to the affected managed server may potentially exploit this issue in a timed attack to harvest credentials when the managed server fails during the boot process.
last seen2020-06-01
modified2020-06-02
plugin id12043
published2004-02-05
reporterThis script is Copyright (C) 2004-2018 Astharot
sourcehttps://www.tenable.com/plugins/nessus/12043
titleBEA WebLogic config.xml Operator/Admin Password Disclosure
code
#
# Written by Astharot <[email protected]>
#
# UNTESTED


include("compat.inc");

if(description)
{
 script_id(12043);
 script_version ("1.19");
 script_set_attribute(attribute:"plugin_modification_date", value:"2020/06/12");

 script_cve_id("CVE-2004-1757");
 script_bugtraq_id(9501);
 script_xref(name:"CERT", value:"350350");
 
 script_name(english:"BEA WebLogic config.xml Operator/Admin Password Disclosure");
 script_summary(english:"Checks the version of WebLogic");
 
 script_set_attribute(attribute:"synopsis", value:
"The remote web server is affected by a password disclosure 
vulnerability." );
 script_set_attribute(attribute:"description", value:
"The remote web server is running WebLogic.  BEA WebLogic Server and
WebLogic Express are reportedly may allow disclosure of Operator or
Admin passwords.  An attacker who has interactive access to the
affected managed server may potentially exploit this issue in a timed
attack to harvest credentials when the managed server fails during the
boot process." );
 script_set_attribute(attribute:"solution", value:
"Apply vendor-supplied patches." );
 script_set_cvss_base_vector("CVSS2#AV:L/AC:M/Au:N/C:P/I:P/A:P");
 script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
 script_set_attribute(attribute:"exploit_available", value:"true");

 script_set_attribute(attribute:"plugin_publication_date", value: "2004/02/05");
 script_set_attribute(attribute:"vuln_publication_date", value: "2004/01/27");
 script_set_attribute(attribute:"plugin_type", value:"remote");
 script_end_attributes();
 
 script_category(ACT_GATHER_INFO);
 
 script_copyright(english:"This script is Copyright (C) 2004-2020 Astharot");
 script_family(english:"CGI abuses");
 script_dependencie("find_service1.nasl", "http_version.nasl");
 script_require_ports("Services/www", 80);
 script_require_keys("www/weblogic");
 exit(0);
}

#

include("http_func.inc");

port = get_http_port(default:80, embedded:TRUE);

if (! get_port_state(port)) exit(0);

sig = get_kb_item("www/hmap/" + port  + "/description");
if ( sig && "WebLogic" >!< sig ) exit(0);

banner = get_http_banner(port:port);

if ("Temporary Patch for CR127930" >< banner) exit(0);


if (egrep(pattern:"^Server:.*WebLogic ([6-8]\..*)", string:banner))
{
  security_warning(port);
}