First published: Thu Jun 08 2000(Updated: )
The default configuration of BEA WebLogic 3.1.8 through 4.5.1 allows a remote attacker to view source code of a JSP program by requesting a URL which provides the JSP extension in upper case.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle WebLogic Server | ||
Oracle WebLogic Server | >=3.1.8<=4.5.1 | |
Oracle WebLogic Server | =3.1.8 | |
Oracle WebLogic Server | =4.0.4 | |
Oracle WebLogic Server | =4.5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2000-0499 has a severity rating that indicates it allows remote code exposure, which can lead to significant security risks.
To fix CVE-2000-0499, update BEA WebLogic Server to a version that is not affected or configure your web server to restrict access to JSP source files.
Versions 3.1.8 through 4.5.1 of BEA WebLogic Server are affected by CVE-2000-0499.
CVE-2000-0499 enables a remote attacker to view source code of JSP programs, potentially leading to further exploitation.
A workaround for CVE-2000-0499 includes configuring the application server to deny requests that expose JSP source files.