First published: Wed May 16 2007(Updated: )
The JMS Server in BEA WebLogic Server 6.1 through SP7, 7.0 through SP6, and 8.1 through SP5 enforces security access policies on the front end, which allows remote attackers to access protected queues via direct requests to the JMS back-end server.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle WebLogic Server | =6.1-sp4 | |
Oracle WebLogic Server | =8.1 | |
Oracle WebLogic Server | =6.1-sp5 | |
Oracle WebLogic Server | =6.1-sp6 | |
Oracle WebLogic Server | =7.0-sp4 | |
Oracle WebLogic Server | =7.0 | |
Oracle WebLogic Server | =6.1-sp3 | |
Oracle WebLogic Server | =7.0-sp6 | |
Oracle WebLogic Server | =7.0-sp3 | |
Oracle WebLogic Server | =8.1-sp5 | |
Oracle WebLogic Server | =8.1-sp3 | |
Oracle WebLogic Server | =7.0-sp2 | |
Oracle WebLogic Server | =7.0-sp5 | |
Oracle WebLogic Server | =6.1-sp1 | |
Oracle WebLogic Server | =8.1-sp2 | |
Oracle WebLogic Server | =6.1 | |
Oracle WebLogic Server | =7.0-sp1 | |
Oracle WebLogic Server | =8.1-sp1 | |
Oracle WebLogic Server | =8.1-sp4 | |
Oracle WebLogic Server | =6.1-sp2 | |
Oracle WebLogic Server | =6.1-sp7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2007-2696 is considered critical due to its potential for unauthorized access to protected JMS queues.
To fix CVE-2007-2696, update your BEA WebLogic Server to a version that is not vulnerable, specifically beyond SP7 for versions 6.1, beyond SP6 for version 7.0, and beyond SP5 for version 8.1.
CVE-2007-2696 affects BEA WebLogic Server versions 6.1 through SP7, 7.0 through SP6, and 8.1 through SP5.
Attackers can exploit CVE-2007-2696 to remotely access and manage protected JMS queues by bypassing security policies.
While an official workaround is not specified, restricting access to the JMS server and implementing additional network security measures can help mitigate risks.