First published: Wed May 16 2007(Updated: )
The JMS Message Bridge in BEA WebLogic Server 7.0 through SP7 and 8.1 through Service Pack 6, when configured without a username and password, or when the connection URL is not defined, allows remote attackers to bypass the security access policy and "send unauthorized messages to a protected queue."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
BEA Weblogic Server | =7.0-sp7 | |
BEA Weblogic Server | =8.1 | |
BEA Weblogic Server | =7.0-sp4 | |
BEA Weblogic Server | =7.0 | |
BEA Weblogic Server | =7.0-sp6 | |
BEA Weblogic Server | =7.0-sp3 | |
BEA Weblogic Server | =8.1-sp5 | |
BEA Weblogic Server | =8.1-sp3 | |
BEA Weblogic Server | =7.0-sp2 | |
BEA Weblogic Server | =7.0-sp5 | |
BEA Weblogic Server | =8.1-sp2 | |
BEA Weblogic Server | =7.0-sp1 | |
BEA Weblogic Server | =8.1-sp1 | |
BEA Weblogic Server | =8.1-sp4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.