The URL pattern matching feature in BEA WebLogic Server 6.x matches illegal patterns ending in "*" as wildcards as if they were the legal "/*" pattern, which could cause WebLogic 7.x to allow remote attackers to bypass intended access restrictions because the illegal patterns are properly rejected.
2004-07-27T04:00:00.000
2025-04-03T01:03:51.193
Deferred
CVSSv2: 7.5 (HIGH)
AV:N/AC:L/Au:N/C:P/I:P/A:P
10.0
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | bea | weblogic_server | 7.0 | Yes |
Application | bea | weblogic_server | 7.0 | Yes |
Application | bea | weblogic_server | 7.0 | Yes |
Application | bea | weblogic_server | 7.0 | Yes |
Application | bea | weblogic_server | 7.0 | Yes |
Application | bea | weblogic_server | 7.0 | Yes |
Application | bea | weblogic_server | 7.0 | Yes |
Application | bea | weblogic_server | 7.0 | Yes |
Application | bea | weblogic_server | 7.0 | Yes |
Application | bea | weblogic_server | 7.0 | Yes |
Application | bea | weblogic_server | 7.0 | Yes |
Application | bea | weblogic_server | 7.0 | Yes |
Application | bea | weblogic_server | 7.0 | Yes |
Application | bea | weblogic_server | 7.0 | Yes |
Application | bea | weblogic_server | 7.0 | Yes |
Application | bea | weblogic_server | 8.1 | Yes |
Application | bea | weblogic_server | 8.1 | Yes |
Application | bea | weblogic_server | 8.1 | Yes |
Application | bea | weblogic_server | 8.1 | Yes |
Application | bea | weblogic_server | 8.1 | Yes |
Application | bea | weblogic_server | 8.1 | Yes |