Lucene search

K
cve[email protected]CVE-2005-1745
HistoryMay 24, 2005 - 4:00 a.m.

CVE-2005-1745

2005-05-2404:00:00
web.nvd.nist.gov
21
cve-2005-1745
bea
weblogic portal
userlogin control
password exposure
security vulnerability

4.6 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

9.5 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

41.1%

The UserLogin control in BEA WebLogic Portal 8.1 through Service Pack 3 prints the password to standard output when an incorrect login attempt is made, which could make it easier for attackers to guess the correct password.

Affected configurations

NVD
Node
beaweblogic_serverMatch6.0
OR
beaweblogic_serverMatch6.0express
OR
beaweblogic_serverMatch6.0win32
OR
beaweblogic_serverMatch6.0sp1
OR
beaweblogic_serverMatch6.0sp1express
OR
beaweblogic_serverMatch6.0sp1win32
OR
beaweblogic_serverMatch6.0sp2
OR
beaweblogic_serverMatch6.0sp2express
OR
beaweblogic_serverMatch6.0sp2win32
OR
beaweblogic_serverMatch6.1
OR
beaweblogic_serverMatch6.1express
OR
beaweblogic_serverMatch6.1win32
OR
beaweblogic_serverMatch6.1sp1
OR
beaweblogic_serverMatch6.1sp1express
OR
beaweblogic_serverMatch6.1sp1win32
OR
beaweblogic_serverMatch6.1sp2
OR
beaweblogic_serverMatch6.1sp2express
OR
beaweblogic_serverMatch6.1sp2win32
OR
beaweblogic_serverMatch6.1sp3
OR
beaweblogic_serverMatch6.1sp3express
OR
beaweblogic_serverMatch6.1sp3win32
OR
beaweblogic_serverMatch6.1sp4
OR
beaweblogic_serverMatch6.1sp4express
OR
beaweblogic_serverMatch6.1sp4win32
OR
beaweblogic_serverMatch6.1sp5
OR
beaweblogic_serverMatch6.1sp5express
OR
beaweblogic_serverMatch6.1sp5win32
OR
beaweblogic_serverMatch6.1sp6
OR
beaweblogic_serverMatch6.1sp6win32
OR
beaweblogic_serverMatch7.0
OR
beaweblogic_serverMatch7.0express
OR
beaweblogic_serverMatch7.0win32
OR
beaweblogic_serverMatch7.0sp1
OR
beaweblogic_serverMatch7.0sp1express
OR
beaweblogic_serverMatch7.0sp1win32
OR
beaweblogic_serverMatch7.0sp2
OR
beaweblogic_serverMatch7.0sp2express
OR
beaweblogic_serverMatch7.0sp2win32
OR
beaweblogic_serverMatch7.0sp3
OR
beaweblogic_serverMatch7.0sp3express
OR
beaweblogic_serverMatch7.0sp3win32
OR
beaweblogic_serverMatch7.0sp4
OR
beaweblogic_serverMatch7.0sp4express
OR
beaweblogic_serverMatch7.0sp4win32
OR
beaweblogic_serverMatch7.0sp5
OR
beaweblogic_serverMatch7.0sp5express
OR
beaweblogic_serverMatch7.0sp5win32
OR
beaweblogic_serverMatch7.0.0.1
OR
beaweblogic_serverMatch7.0.0.1express
OR
beaweblogic_serverMatch7.0.0.1win32
OR
beaweblogic_serverMatch7.0.0.1sp1
OR
beaweblogic_serverMatch7.0.0.1sp1express
OR
beaweblogic_serverMatch7.0.0.1sp1win32
OR
beaweblogic_serverMatch7.0.0.1sp2
OR
beaweblogic_serverMatch7.0.0.1sp2express
OR
beaweblogic_serverMatch7.0.0.1sp2win32
OR
beaweblogic_serverMatch7.0.0.1sp3
OR
beaweblogic_serverMatch7.0.0.1sp3express
OR
beaweblogic_serverMatch7.0.0.1sp4
OR
beaweblogic_serverMatch7.0.0.1sp4express
OR
beaweblogic_serverMatch8.1
OR
beaweblogic_serverMatch8.1express
OR
beaweblogic_serverMatch8.1win32
OR
beaweblogic_serverMatch8.1sp1
OR
beaweblogic_serverMatch8.1sp1express
OR
beaweblogic_serverMatch8.1sp1win32
OR
beaweblogic_serverMatch8.1sp2
OR
beaweblogic_serverMatch8.1sp2express
OR
beaweblogic_serverMatch8.1sp2win32
OR
beaweblogic_serverMatch8.1sp3
OR
beaweblogic_serverMatch8.1sp3express
OR
beaweblogic_serverMatch8.1sp3win32
OR
beaweblogic_serverMatch8.1sp4
OR
beaweblogic_serverMatch8.1sp4express
OR
beaweblogic_serverMatch8.1sp4win32
OR
oracleweblogic_portalMatch8.0

4.6 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

9.5 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

41.1%

Related for CVE-2005-1745