
18/10/2007

7/8/2024
CVE-2007-5576: Infoleak
First published: Thu Oct 18 2007(Updated: )
BEA Tuxedo 8.0 before RP392 and 8.1 before RP293, and WebLogic Enterprise 5.1 before RP174, echo the password in cleartext, which allows physically proximate attackers to obtain sensitive information via the (1) cnsbind, (2) cnsunbind, or (3) cnsls commands.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|
Oracle WebLogic Server | =8.1 | |
Oracle WebLogic Server | =7.0-sp2 | |
Oracle WebLogic Server | =7.0.0.1-sp4 | |
Oracle WebLogic Server | =7.0-sp7 | |
Oracle WebLogic Server | =6.1 | |
BEA Tuxedo | =8.0 | |
BEA WebLogic Integration | =8.1-sp2 | |
Oracle WebLogic Server | =9.0 | |
Oracle WebLogic Server | =9.2 | |
Oracle WebLogic Server | =7.0-sp4 | |
Oracle WebLogic Server | =6.1-sp1 | |
BEA WebLogic Workshop | =8.1-sp2 | |
Oracle WebLogic Server | =7.0 | |
BEA WebLogic Workshop | =8.1-sp6 | |
Oracle WebLogic Server | =6.1-sp4 | |
Oracle WebLogic Server | =7.0.0.1-sp1 | |
Oracle WebLogic Server | =6.1-sp7 | |
Oracle WebLogic Server | =8.1-sp5 | |
Oracle WebLogic Server | =7.0-sp6 | |
Oracle WebLogic Server | =7.0-sp3 | |
Oracle WebLogic Server | =6.1-sp6 | |
Oracle WebLogic Server | =7.0-sp2 | |
Oracle WebLogic Server | =7.0-sp7 | |
BEA WebLogic Integration | =9.2 | |
Oracle WebLogic Server | =7.0-sp3 | |
BEA WebLogic Integration | =8.1-sp4 | |
BEA WebLogic Integration | =8.1-sp5 | |
Oracle WebLogic Server | =8.1-sp4 | |
Oracle WebLogic Server | =7.0-sp5 | |
Oracle WebLogic Server | =7.0-sp5 | |
Oracle WebLogic Server | =5.1 | |
Oracle WebLogic Server | =9.1 | |
Oracle WebLogic Server | =8.1-sp1 | |
Oracle WebLogic Server | =8.1-sp3 | |
BEA WebLogic Integration | =8.1-sp6 | |
BEA WebLogic Workshop | =8.1-sp4 | |
BEA WebLogic Integration | =8.1 | |
BEA WebLogic Integration | =8.1-sp3 | |
Oracle WebLogic Server | =7.0.0.1 | |
Oracle WebLogic Server | =6.1-sp2 | |
Oracle WebLogic Server | =7.0-sp1 | |
Oracle WebLogic Server | =7.0.0.1-sp2 | |
Oracle WebLogic Server | =9.1 | |
Oracle WebLogic Server | =6.1-sp5 | |
Oracle WebLogic Server | =6.1-sp3 | |
Oracle WebLogic Server | =7.0-sp1 | |
Oracle WebLogic Server | =9.2 | |
BEA WebLogic Workshop | =8.1-sp5 | |
Oracle WebLogic Server | =8.1-sp2 | |
Oracle WebLogic Server | =7.0 | |
Oracle WebLogic Server | =7.0-sp6 | |
Oracle WebLogic Server | =7.0.0.1-sp3 | |
BEA WebLogic Workshop | =8.1-sp3 | |
BEA Tuxedo | =8.1 | |
Oracle WebLogic Server | =7.0-sp4 | |
BEA WebLogic Portal | =9.2 | |
Never miss a vulnerability like this again
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
Frequently Asked Questions
What is the severity of CVE-2007-5576?
CVE-2007-5576 is classified as a critical vulnerability due to its potential to expose sensitive information.
How do I fix CVE-2007-5576?
To fix CVE-2007-5576, update to the respective patched versions of BEA Tuxedo 8.0 after RP392 or 8.1 after RP293 and WebLogic Enterprise 5.1 after RP174.
What types of attacks are possible due to CVE-2007-5576?
CVE-2007-5576 allows physically proximate attackers to intercept and obtain passwords through command outputs.
What products are affected by CVE-2007-5576?
CVE-2007-5576 affects various versions of BEA Tuxedo and Oracle WebLogic Server, including versions 5.1, 6.1, 7.0, 8.0, and 8.1.
What commands are involved in the exploitation of CVE-2007-5576?
The exploitation of CVE-2007-5576 involves the commands cnsbind, cnsunbind, and cnsls.
- agent/references
- agent/type
- collector/mitre-cve
- source/MITRE
- agent/author
- agent/severity
- agent/weakness
- agent/last-modified-date
- agent/first-publish-date
- agent/description
- agent/event
- agent/source
- agent/tags
- agent/softwarecombine
- collector/nvd-historical
- agent/software-canonical-lookup-request
- collector/nvd-index
- vendor/bea
- canonical/oracle weblogic server
- version/oracle weblogic server/8.1
- version/oracle weblogic server/7.0-sp2
- version/oracle weblogic server/7.0.0.1-sp4
- version/oracle weblogic server/7.0-sp7
- version/oracle weblogic server/6.1
- canonical/bea tuxedo
- version/bea tuxedo/8.0
- canonical/bea weblogic integration
- version/bea weblogic integration/8.1-sp2
- version/oracle weblogic server/9.0
- version/oracle weblogic server/9.2
- version/oracle weblogic server/7.0-sp4
- version/oracle weblogic server/6.1-sp1
- canonical/bea weblogic workshop
- version/bea weblogic workshop/8.1-sp2
- version/oracle weblogic server/7.0
- version/bea weblogic workshop/8.1-sp6
- version/oracle weblogic server/6.1-sp4
- version/oracle weblogic server/7.0.0.1-sp1
- version/oracle weblogic server/6.1-sp7
- version/oracle weblogic server/8.1-sp5
- version/oracle weblogic server/7.0-sp6
- version/oracle weblogic server/7.0-sp3
- version/oracle weblogic server/6.1-sp6
- version/bea weblogic integration/9.2
- version/bea weblogic integration/8.1-sp4
- version/bea weblogic integration/8.1-sp5
- version/oracle weblogic server/8.1-sp4
- version/oracle weblogic server/7.0-sp5
- version/oracle weblogic server/5.1
- version/oracle weblogic server/9.1
- version/oracle weblogic server/8.1-sp1
- version/oracle weblogic server/8.1-sp3
- version/bea weblogic integration/8.1-sp6
- version/bea weblogic workshop/8.1-sp4
- version/bea weblogic integration/8.1
- version/bea weblogic integration/8.1-sp3
- version/oracle weblogic server/7.0.0.1
- version/oracle weblogic server/6.1-sp2
- version/oracle weblogic server/7.0-sp1
- version/oracle weblogic server/7.0.0.1-sp2
- version/oracle weblogic server/6.1-sp5
- version/oracle weblogic server/6.1-sp3
- version/bea weblogic workshop/8.1-sp5
- version/oracle weblogic server/8.1-sp2
- version/oracle weblogic server/7.0.0.1-sp3
- version/bea weblogic workshop/8.1-sp3
- version/bea tuxedo/8.1
- vendor/oracle
- canonical/bea weblogic portal
- version/bea weblogic portal/9.2
Contact
SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.coBy using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203