The JMS Message Bridge in BEA WebLogic Server 7.0 through SP7 and 8.1 through Service Pack 6, when configured without a username and password, or when the connection URL is not defined, allows remote attackers to bypass the security access policy and "send unauthorized messages to a protected queue."
2007-05-16T01:19:00.000
2025-04-09T00:30:58.490
Deferred
CVSSv2: 4.6 (MEDIUM)
AV:N/AC:H/Au:S/C:P/I:P/A:P
3.9
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | bea | weblogic_server | 7.0 | Yes |
Application | bea | weblogic_server | 7.0 | Yes |
Application | bea | weblogic_server | 7.0 | Yes |
Application | bea | weblogic_server | 7.0 | Yes |
Application | bea | weblogic_server | 7.0 | Yes |
Application | bea | weblogic_server | 7.0 | Yes |
Application | bea | weblogic_server | 7.0 | Yes |
Application | bea | weblogic_server | 7.0 | Yes |
Application | bea | weblogic_server | 8.1 | Yes |
Application | bea | weblogic_server | 8.1 | Yes |
Application | bea | weblogic_server | 8.1 | Yes |
Application | bea | weblogic_server | 8.1 | Yes |
Application | bea | weblogic_server | 8.1 | Yes |
Application | bea | weblogic_server | 8.1 | Yes |