First published: Thu Feb 21 2008(Updated: )
BEA WebLogic Portal 10.0 and 9.2 through Maintenance Pack 2, under certain circumstances, can redirect a user from the https:// URI for the Portal Administration Console to an http URI, which allows remote attackers to sniff the session.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
BEA WebLogic Portal | =9.2-mp2 | |
BEA WebLogic Portal | =10.0 | |
BEA WebLogic Portal | =9.2-mp1 | |
BEA WebLogic Portal | =9.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-0870 has been identified with a high severity due to the potential for session sniffing.
To mitigate CVE-2008-0870, ensure that you are using secure connections and apply the latest patches from BEA Systems or Oracle.
CVE-2008-0870 affects BEA WebLogic Portal versions 9.2 through Maintenance Pack 2 and 10.0.
CVE-2008-0870 allows remote attackers to sniff session information due to a redirection from HTTPS to HTTP.
While the best solution is to update to a patched version, you can also restrict access to the Portal Administration Console to trusted networks.