First published: Fri Oct 13 2000(Updated: )
BEA WebLogic 5.1.x allows remote attackers to read source code for parsed pages by inserting /ConsoleHelp/ into the URL, which invokes the FileServlet.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle WebLogic Server | =5.1 | |
Oracle WebLogic Server | =5.1 | |
Oracle WebLogic Server | =5.1 | |
Oracle WebLogic Server | =5.1-sp1 | |
Oracle WebLogic Server | =5.1-sp10 | |
Oracle WebLogic Server | =5.1-sp11 | |
Oracle WebLogic Server | =5.1-sp12 | |
Oracle WebLogic Server | =5.1-sp2 | |
Oracle WebLogic Server | =5.1-sp3 | |
Oracle WebLogic Server | =5.1-sp4 | |
Oracle WebLogic Server | =5.1-sp5 | |
Oracle WebLogic Server | =5.1-sp6 | |
Oracle WebLogic Server | =5.1-sp7 | |
Oracle WebLogic Server | =5.1-sp8 | |
Oracle WebLogic Server | =5.1-sp9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2000-0682 is considered to have a medium severity due to the potential exposure of sensitive source code.
To fix CVE-2000-0682, it is recommended to upgrade to a patched version of BEA WebLogic Server beyond 5.1.
CVE-2000-0682 affects users of BEA WebLogic Server versions 5.1 and its various service packs.
CVE-2000-0682 is a remote code exposure vulnerability that allows attackers to access source code via manipulated URLs.
Exploitation of CVE-2000-0682 could lead to unauthorized access to application source code, potentially revealing sensitive information.