Vulnerability Note VU#350350

BEA WebLogic Server stores administrator password in clear text in config.xml

Original Release date: 12 Apr 2004 | Last revised: 14 Apr 2004

Overview

BEA WebLogic Server stores the administrator password used to boot the server in clear text within the config.xml file.

Description

BEA Systems describes WebLogic Server as "an industrial-strength application infrastructure for developing, integrating, securing, and managing distributed Java applications." There is a vulnerability in the way BEA Weblogic Server stores the administrative password used to boot the server.

According to the BEA Security Advisory,

    Due to a coding error, the administrator password used to boot the server might automatically be written in clear text to the config.xml file. A user with access to the config.xml file can obtain the password and use it to impersonate an administrator.
The BEA Security Advisory states that the following versions of WebLogic Server and Express are affected by this vulnerability:
  • WebLogic Server and Express 8.1, released and Service Pack 1, on all platforms

Impact

A user with access to the config.xml file may acquire the administrator password used to boot the server. The user could subsequently use this password to impersonate an administrator.

Solution

Apply Patch
BEA has released an advisory to address this issue. According to the BEA Security Advisory, it is recommended that users upgrade to Service Pack 2.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
BEA Systems Inc.Affected-12 Apr 2004
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A

References

Credit

This vulnerability was reported by BEA Systems Inc.

This document was written by Lucy Crocker.

Other Information

  • CVE IDs: Unknown
  • Date Public: 27 Jan 2004
  • Date First Published: 12 Apr 2004
  • Date Last Updated: 14 Apr 2004
  • Severity Metric: 7.24
  • Document Revision: 10

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.