First published: Wed Jun 21 2000(Updated: )
The default configuration of BEA WebLogic 5.1.0 allows a remote attacker to view source code of programs by requesting a URL beginning with /file/, which causes the default servlet to display the file without further processing.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle WebLogic Server | =3.1.8 | |
Oracle WebLogic Server | =3.1.8 | |
Oracle WebLogic Server | =4.0 | |
Oracle WebLogic Server | =4.0 | |
Oracle WebLogic Server | =4.5 | |
Oracle WebLogic Server | =4.5 | |
Oracle WebLogic Server | =5.1 | |
Oracle WebLogic Server | =5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2000-0500 is considered a significant vulnerability due to its potential to expose sensitive source code to remote attackers.
To fix CVE-2000-0500, ensure that the default configuration of BEA WebLogic is modified to restrict access to the /file/ directory.
CVE-2000-0500 affects multiple versions of BEA WebLogic Server, including versions 3.1.8, 4.0, 4.5, and 5.1.
Yes, CVE-2000-0500 can lead to data exposure as it allows attackers to view the source code of applications.
Yes, there are known exploits for CVE-2000-0500 that leverage the vulnerability to access source code without authorization.