First published: Fri Feb 22 2008(Updated: )
BEA WebLogic Server and Express 7.0 through 10.0 allows remote attackers to conduct brute force password guessing attacks, even when account lockout has been activated, via crafted URLs that indicate whether a guessed password is successful or not.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle WebLogic Server | =7.0 | |
Oracle WebLogic Server | =7.0-sp1 | |
Oracle WebLogic Server | =7.0-sp2 | |
Oracle WebLogic Server | =7.0-sp3 | |
Oracle WebLogic Server | =7.0-sp4 | |
Oracle WebLogic Server | =7.0-sp5 | |
Oracle WebLogic Server | =7.0-sp6 | |
Oracle WebLogic Server | =7.0-sp7 | |
Oracle WebLogic Server | =8.1 | |
Oracle WebLogic Server | =8.1-sp1 | |
Oracle WebLogic Server | =8.1-sp2 | |
Oracle WebLogic Server | =8.1-sp3 | |
Oracle WebLogic Server | =8.1-sp4 | |
Oracle WebLogic Server | =8.1-sp5 | |
Oracle WebLogic Server | =8.1-sp6 | |
Oracle WebLogic Server | =9.0 | |
Oracle WebLogic Server | =9.1 | |
Oracle WebLogic Server | =9.2 | |
Oracle WebLogic Server | =9.2-mp1 | |
Oracle WebLogic Server | =9.2-mp2 | |
Oracle WebLogic Server | =10.0 | |
Oracle WebLogic Server | =10.0_mp1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-0901 is considered to have a medium severity rating due to its potential for remote exploitation.
To fix CVE-2008-0901, apply the latest patches or updates provided by Oracle for affected versions of WebLogic Server.
Yes, CVE-2008-0901 can be exploited remotely by attackers through crafted URLs.
CVE-2008-0901 affects BEA WebLogic Server and Express versions from 7.0 through 10.0.
No, even when account lockout is activated, CVE-2008-0901 allows attackers to conduct brute force password guessing attacks.