Lucene search

K
cve[email protected]CVE-2005-1747
HistoryMay 24, 2005 - 4:00 a.m.

CVE-2005-1747

2005-05-2404:00:00
web.nvd.nist.gov
20
cve
2005
1747
cross-site scripting
xss
bea
weblogic server
express
security vulnerability
remote attack
web script
html
administrative privilege

8.4 High

AI Score

Confidence

High

6.8 Medium

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.96 High

EPSS

Percentile

99.5%

Multiple cross-site scripting (XSS) vulnerabilities in BEA WebLogic Server and Express 8.1 through Service Pack 4, and 7.0 through Service Pack 6, allow remote attackers to inject arbitrary web script or HTML, and possibly gain administrative privileges, via the (1) j_username or (2) j_password parameters in the login page (LoginForm.jsp), (3) parameters to the error page in the Administration Console, (4) unknown vectors in the Server Console while the administrator has an active session to obtain the ADMINCONSOLESESSION cookie, or (5) an alternate vector in the Server Console that does not require an active session but also leaks the username and password.

Affected configurations

NVD
Node
beaweblogic_serverMatch6.0
OR
beaweblogic_serverMatch6.0express
OR
beaweblogic_serverMatch6.0win32
OR
beaweblogic_serverMatch6.0sp1
OR
beaweblogic_serverMatch6.0sp1express
OR
beaweblogic_serverMatch6.0sp1win32
OR
beaweblogic_serverMatch6.0sp2
OR
beaweblogic_serverMatch6.0sp2express
OR
beaweblogic_serverMatch6.0sp2win32
OR
beaweblogic_serverMatch6.1
OR
beaweblogic_serverMatch6.1express
OR
beaweblogic_serverMatch6.1win32
OR
beaweblogic_serverMatch6.1sp1
OR
beaweblogic_serverMatch6.1sp1express
OR
beaweblogic_serverMatch6.1sp1win32
OR
beaweblogic_serverMatch6.1sp2
OR
beaweblogic_serverMatch6.1sp2express
OR
beaweblogic_serverMatch6.1sp2win32
OR
beaweblogic_serverMatch6.1sp3
OR
beaweblogic_serverMatch6.1sp3express
OR
beaweblogic_serverMatch6.1sp3win32
OR
beaweblogic_serverMatch6.1sp4
OR
beaweblogic_serverMatch6.1sp4express
OR
beaweblogic_serverMatch6.1sp4win32
OR
beaweblogic_serverMatch6.1sp5
OR
beaweblogic_serverMatch6.1sp5express
OR
beaweblogic_serverMatch6.1sp5win32
OR
beaweblogic_serverMatch6.1sp6
OR
beaweblogic_serverMatch6.1sp6win32
OR
beaweblogic_serverMatch7.0
OR
beaweblogic_serverMatch7.0express
OR
beaweblogic_serverMatch7.0win32
OR
beaweblogic_serverMatch7.0sp1
OR
beaweblogic_serverMatch7.0sp1express
OR
beaweblogic_serverMatch7.0sp1win32
OR
beaweblogic_serverMatch7.0sp2
OR
beaweblogic_serverMatch7.0sp2express
OR
beaweblogic_serverMatch7.0sp2win32
OR
beaweblogic_serverMatch7.0sp3
OR
beaweblogic_serverMatch7.0sp3express
OR
beaweblogic_serverMatch7.0sp3win32
OR
beaweblogic_serverMatch7.0sp4
OR
beaweblogic_serverMatch7.0sp4express
OR
beaweblogic_serverMatch7.0sp4win32
OR
beaweblogic_serverMatch7.0sp5
OR
beaweblogic_serverMatch7.0sp5express
OR
beaweblogic_serverMatch7.0sp5win32
OR
beaweblogic_serverMatch7.0.0.1
OR
beaweblogic_serverMatch7.0.0.1express
OR
beaweblogic_serverMatch7.0.0.1win32
OR
beaweblogic_serverMatch7.0.0.1sp1
OR
beaweblogic_serverMatch7.0.0.1sp1express
OR
beaweblogic_serverMatch7.0.0.1sp1win32
OR
beaweblogic_serverMatch7.0.0.1sp2
OR
beaweblogic_serverMatch7.0.0.1sp2express
OR
beaweblogic_serverMatch7.0.0.1sp2win32
OR
beaweblogic_serverMatch7.0.0.1sp3
OR
beaweblogic_serverMatch7.0.0.1sp3express
OR
beaweblogic_serverMatch7.0.0.1sp4
OR
beaweblogic_serverMatch7.0.0.1sp4express
OR
beaweblogic_serverMatch8.1
OR
beaweblogic_serverMatch8.1express
OR
beaweblogic_serverMatch8.1win32
OR
beaweblogic_serverMatch8.1sp1
OR
beaweblogic_serverMatch8.1sp1express
OR
beaweblogic_serverMatch8.1sp1win32
OR
beaweblogic_serverMatch8.1sp2
OR
beaweblogic_serverMatch8.1sp2express
OR
beaweblogic_serverMatch8.1sp2win32
OR
beaweblogic_serverMatch8.1sp3
OR
beaweblogic_serverMatch8.1sp3express
OR
beaweblogic_serverMatch8.1sp3win32
OR
beaweblogic_serverMatch8.1sp4
OR
beaweblogic_serverMatch8.1sp4express
OR
beaweblogic_serverMatch8.1sp4win32
OR
oracleweblogic_portalMatch8.0

8.4 High

AI Score

Confidence

High

6.8 Medium

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.96 High

EPSS

Percentile

99.5%