BEA WebLogic Server stores the administrator password used to boot the server in clear text within the config.xml file.
BEA Systems describes WebLogic Server as "an industrial-strength application infrastructure for developing, integrating, securing, and managing distributed Java applications." There is a vulnerability in the way BEA Weblogic Server stores the administrative password used to boot the server.
According to the BEA Security Advisory,
A user with access to the config.xml file may acquire the administrator password used to boot the server. The user could subsequently use this password to impersonate an administrator.
Apply PatchBEA has released an advisory to address this issue. According to the BEA Security Advisory, it is recommended that users upgrade to Service Pack 2.
This vulnerability was reported by BEA Systems Inc.
This document was written by Lucy Crocker.
|Date First Published:||2004-04-12|
|Date Last Updated:||2004-04-14 16:20 UTC|