Vulnerability Note VU#184558

BEA WebLogic Server contains a vulnerability in the URL pattern matching

Original Release date: 26 Apr 2004 | Last revised: 26 Apr 2004

Overview

There is a vulnerability in the URL pattern matching functionality of BEA WebLogic Server that could allow URL restrictions to be bypassed.

Description

BEA Systems describes WebLogic Server as "an industrial-strength application infrastructure for developing, integrating, securing, and managing distributed Java applications." The WebLogic Server provides a feature that allows an administrator to restrict access to certain URLs. There is a vulnerability in this URL pattern matching feature that could cause patterns ending in "*" rather than "/*" to be evaluated as wildcard patterns.

According to the BEA Security Advisory,

    In WebLogic Server version 6.x, the illegal URL pattern of /mydir* is treated the same as the legal URL pattern /mydir/*. If a WebLogic Server version 6.x Web application used the illegal syntax and is moved to WebLogic Server version 7.x or greater, the URL patterns that were protected by the illegal syntax will stop being protected. There is no notification in the change of protection.

According to the BEA Security Advisory, the following versions of WebLogic Server and Express are affected by this vulnerability:
  • WebLogic Server and WebLogic Express version 8.1 through Service Pack 1, on all platforms
  • WebLogic Server and WebLogic Express version 7.0 through Service Pack 4, on all platforms

Impact

A remote user could access restricted URLs that were previously protected by specific URL pattern matching syntax.

Solution

Upgrade or Fix Syntax

    WebLogic Server and WebLogic Express version 8.1
    Upgrade to WebLogic Server and WebLogic Express version 8.1 Service Pack 2.
    or
    In all deployed web applications, convert the illegal URL patterns to legal syntax.
    WebLogic Server and WebLogic Express version 7.0
    Upgrade to WebLogic Server and WebLogic Express version 7.0 Service Pack 5.
    or
    In all deployed web applications, convert the illegal URL patterns to legal syntax.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
BEA Systems Inc.Affected-26 Apr 2004
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A

References

Credit

This vulnerability was reported by BEA Systems Inc.

This document was written by Damon Morda.

Other Information

  • CVE IDs: Unknown
  • Date Public: 21 Apr 2004
  • Date First Published: 26 Apr 2004
  • Date Last Updated: 26 Apr 2004
  • Severity Metric: 4.16
  • Document Revision: 19

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.