First published: Wed Jan 25 2006(Updated: )
BEA WebLogic Server and WebLogic Express 8.1 through SP4, when configuration auditing is enabled and a password change occurs, stores the old and new passwords in cleartext in the DefaultAuditRecorder.log file, which could allow attackers to gain privileges.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle WebLogic Server | =8.1-sp1 | |
Oracle WebLogic Server | =8.1-sp1 | |
Oracle WebLogic Server | =8.1-sp2 | |
Oracle WebLogic Server | =8.1-sp2 | |
Oracle WebLogic Server | =8.1-sp3 | |
Oracle WebLogic Server | =8.1-sp3 | |
Oracle WebLogic Server | =8.1-sp4 | |
Oracle WebLogic Server | =8.1-sp4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-0426 is considered a high severity vulnerability due to the exposure of sensitive information in cleartext.
To fix CVE-2006-0426, disable configuration auditing or ensure that sensitive data is not logged in cleartext.
CVE-2006-0426 affects BEA WebLogic Server and WebLogic Express versions 8.1 through SP4.
CVE-2006-0426 leaks both old and new passwords in cleartext within the DefaultAuditRecorder.log file.
Yes, attackers can potentially exploit CVE-2006-0426 remotely if they have access to the logged files containing sensitive information.