First published: Wed May 16 2007(Updated: )
The JMS Server in BEA WebLogic Server 6.1 through SP7, 7.0 through SP6, and 8.1 through SP5 enforces security access policies on the front end, which allows remote attackers to access protected queues via direct requests to the JMS back-end server.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
BEA Weblogic Server | =6.1-sp4 | |
BEA Weblogic Server | =8.1 | |
BEA Weblogic Server | =6.1-sp5 | |
BEA Weblogic Server | =6.1-sp6 | |
BEA Weblogic Server | =7.0-sp4 | |
BEA Weblogic Server | =7.0 | |
BEA Weblogic Server | =6.1-sp3 | |
BEA Weblogic Server | =7.0-sp6 | |
BEA Weblogic Server | =7.0-sp3 | |
BEA Weblogic Server | =8.1-sp5 | |
BEA Weblogic Server | =8.1-sp3 | |
BEA Weblogic Server | =7.0-sp2 | |
BEA Weblogic Server | =7.0-sp5 | |
BEA Weblogic Server | =6.1-sp1 | |
BEA Weblogic Server | =8.1-sp2 | |
BEA Weblogic Server | =6.1 | |
BEA Weblogic Server | =7.0-sp1 | |
BEA Weblogic Server | =8.1-sp1 | |
BEA Weblogic Server | =8.1-sp4 | |
BEA Weblogic Server | =6.1-sp2 | |
BEA Weblogic Server | =6.1-sp7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.