header-logo
Suggest Exploit
vendor:
WebLogic Server
by:
SecurityFocus
7.5
CVSS
HIGH
Buffer Overflow
120
CWE
Product Name: WebLogic Server
Affected Version From: 6
Affected Version To: 6.1
Patch Exists: YES
Related CWE: CVE-2002-0019
CPE: a:bea:weblogic_server
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows, Linux, Mac
2002

BEA Systems WebLogic Server Unchecked Buffers Vulnerability

BEA Systems WebLogic Server is vulnerable to an unchecked buffer vulnerability in a particular handler for URL requests that begin with two dots '..'. Depending on the data entered into the buffer, WebLogic Server could be forced to crash or arbitrary code could be executed on the system in the security context of the web server. In the event that random data was sent in order to crash the server, restarting the application would be required in order to regain normal functionality.

Mitigation:

Upgrade to the latest version of WebLogic Server, or apply the patch provided by BEA Systems.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/2138/info


BEA Systems WebLogic Server is an enterprise level web and wireless application server.

Unchecked buffers exist in a particular handler for URL requests that begin with two dots "..". Depending on the data entered into the buffer, WebLogic Server could be forced to crash or arbitrary code could be executed on the system in the security context of the web server. In the event that random data was sent in order to crash the server, restarting the application would be required in order to regain normal functionality. 

..<overly long string of characters>