First published: Wed Dec 31 2003(Updated: )
BEA WebLogic Server and Express version 7.0 SP3 may follow certain code execution paths that result in an incorrect current user, such as in the frequent use of JNDI initial contexts, which could allow remote authenticated users to gain privileges.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle WebLogic Server | =7.0-sp3 | |
Oracle WebLogic Server | =7.0-sp3 | |
Oracle WebLogic Server | =7.0-sp3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2003-1094 is considered a high-severity vulnerability due to the potential for unauthorized privilege escalation.
To fix CVE-2003-1094, it is recommended to upgrade to a patched version of BEA WebLogic Server beyond 7.0 SP3.
CVE-2003-1094 affects users of BEA WebLogic Server and Express version 7.0 SP3.
CVE-2003-1094 could allow remote authenticated users to gain elevated privileges through incorrect user context handling.
There are no reliable workarounds for CVE-2003-1094; upgrading to a secure version is the best course of action.