First published: Tue Dec 31 2002(Updated: )
BEA WebLogic Server and Express 6.1 through 7.0.0.1 buffers HTTP requests in a way that can cause BEA to send the same response for two different HTTP requests, which could allow remote attackers to obtain sensitive information that was intended for other users.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle WebLogic Server | =6.1 | |
Oracle WebLogic Server | =6.1-sp1 | |
Oracle WebLogic Server | =7.0 | |
Oracle WebLogic Server | =7.0.0.1 | |
Oracle WebLogic Server | =6.1-sp1 | |
Oracle WebLogic Server | =6.1 | |
Oracle WebLogic Server | =7.0.0.1 | |
Oracle WebLogic Server | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-2177 has a medium severity rating due to the potential exposure of sensitive information.
To fix CVE-2002-2177, upgrade to a patched version of BEA WebLogic Server or apply any recommended security updates.
CVE-2002-2177 can allow remote attackers to receive information intended for other users, posing significant privacy risks.
CVE-2002-2177 affects BEA WebLogic Server and Express versions 6.1, 6.1-sp1, and 7.0 up to 7.0.0.1.
CVE-2002-2177 primarily targets users of BEA WebLogic Server who may inadvertently expose sensitive data to unauthorized parties.