First published: Fri May 19 2006(Updated: )
The HTTP handlers in BEA WebLogic Server 9.0, 8.1 up to SP5, 7.0 up to SP6, and 6.1 up to SP7 stores the username and password in cleartext in the WebLogic Server log when access to a web application or protected JWS fails, which allows attackers to gain privileges.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle WebLogic Server | =6.1-sp4 | |
Oracle WebLogic Server | =8.1 | |
Oracle WebLogic Server | =6.1-sp5 | |
Oracle WebLogic Server | =9.0 | |
Oracle WebLogic Server | =7.0-sp4 | |
Oracle WebLogic Server | =7.0 | |
Oracle WebLogic Server | =6.1-sp3 | |
Oracle WebLogic Server | =7.0-sp3 | |
Oracle WebLogic Server | =8.1-sp3 | |
Oracle WebLogic Server | =7.0-sp2 | |
Oracle WebLogic Server | =7.0-sp5 | |
Oracle WebLogic Server | =6.1-sp1 | |
Oracle WebLogic Server | =6.0-sp6 | |
Oracle WebLogic Server | =8.1-sp2 | |
Oracle WebLogic Server | =6.1 | |
Oracle WebLogic Server | =7.0-sp1 | |
Oracle WebLogic Server | =8.1-sp1 | |
Oracle WebLogic Server | =8.1-sp4 | |
Oracle WebLogic Server | =6.1-sp2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-2469 has a medium severity rating due to the potential exposure of sensitive information.
To address CVE-2006-2469, ensure that you upgrade to the latest patched version of the affected WebLogic Server software.
CVE-2006-2469 affects Oracle WebLogic Server versions 6.1 (up to SP7), 7.0 (up to SP6), 8.1 (up to SP5), and 9.0.
CVE-2006-2469 can result in the leakage of usernames and passwords stored in cleartext in server logs.
Exploiting CVE-2006-2469 can allow attackers to gain unauthorized access and privileges over the affected web applications.