First published: Wed Jul 21 2004(Updated: )
The configuration tools (1) config.sh in Unix or (2) config.cmd in Windows for BEA WebLogic Server 8.1 through SP2 create a log file that contains the administrative username and password in cleartext, which could allow local users to gain privileges.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle WebLogic Server | =8.1 | |
Oracle WebLogic Server | =8.1 | |
Oracle WebLogic Server | =8.1 | |
Oracle WebLogic Server | =8.1-sp1 | |
Oracle WebLogic Server | =8.1-sp1 | |
Oracle WebLogic Server | =8.1-sp1 | |
Oracle WebLogic Server | =8.1-sp2 | |
Oracle WebLogic Server | =8.1-sp2 | |
Oracle WebLogic Server | =8.1-sp2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-0712 is classified as a medium severity vulnerability.
To fix CVE-2004-0712, ensure that the configuration scripts do not store sensitive information in cleartext log files.
CVE-2004-0712 affects Oracle WebLogic Server versions 8.1, 8.1 SP1, and 8.1 SP2.
CVE-2004-0712 exposes administrative usernames and passwords in cleartext.
Local users with access to the log files can exploit CVE-2004-0712 to gain administrative privileges.