The URL pattern matching feature in BEA WebLogic Server 6.x matches illegal patterns ending in "*" as wildcards as if they were the legal "/*" pattern, which could cause WebLogic 7.x to allow remote attackers to bypass intended access restrictions because the illegal patterns are properly rejected.
| Date Added | Due Date | Vulnerability Name | Required Action |
|---|---|---|---|
| N/A |
| Type | Version | Base score | Base severity | Vector |
|---|---|---|---|---|
| Primary | 2.0 | 7.5 | HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
| CWE ID | Type | Source |
|---|---|---|
| NVD-CWE-Other | Primary | nvd@nist.gov |
| Hyperlink | Source | Resource |
|---|---|---|
| http://dev2dev.bea.com/resourcelibrary/advisoriesnotifications/BEA04_56.00.jsp | cve@mitre.org | N/A |
| http://www.kb.cert.org/vuls/id/184558 | cve@mitre.org | Third Party Advisory US Government Resource |
| http://www.securityfocus.com/bid/10184 | cve@mitre.org | Patch Vendor Advisory |
| https://exchange.xforce.ibmcloud.com/vulnerabilities/15927 | cve@mitre.org | N/A |
| http://dev2dev.bea.com/resourcelibrary/advisoriesnotifications/BEA04_56.00.jsp | af854a3a-2127-422b-91ae-364da2661108 | N/A |
| http://www.kb.cert.org/vuls/id/184558 | af854a3a-2127-422b-91ae-364da2661108 | Third Party Advisory US Government Resource |
| http://www.securityfocus.com/bid/10184 | af854a3a-2127-422b-91ae-364da2661108 | Patch Vendor Advisory |
| https://exchange.xforce.ibmcloud.com/vulnerabilities/15927 | af854a3a-2127-422b-91ae-364da2661108 | N/A |