Lucene search

K
cve[email protected]CVE-2005-4762
HistoryOct 03, 2022 - 4:22 p.m.

CVE-2005-4762

2022-10-0316:22:45
web.nvd.nist.gov
19
cve-2005-4762
bea weblogic server
weblogic express
security vulnerability
password storage
local users
administrative privileges

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

7.2 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

5.1%

BEA WebLogic Server and WebLogic Express 8.1 SP4 and earlier, 7.0 SP6 and earlier, and 6.1 SP7 and earlier sometimes stores the boot password in the registry in cleartext, which might allow local users to gain administrative privileges.

Affected configurations

NVD
Node
beaweblogic_serverMatch6.1
OR
beaweblogic_serverMatch6.1express
OR
beaweblogic_serverMatch6.1win32
OR
beaweblogic_serverMatch6.1sp1
OR
beaweblogic_serverMatch6.1sp1express
OR
beaweblogic_serverMatch6.1sp1win32
OR
beaweblogic_serverMatch6.1sp2
OR
beaweblogic_serverMatch6.1sp2express
OR
beaweblogic_serverMatch6.1sp2win32
OR
beaweblogic_serverMatch6.1sp3
OR
beaweblogic_serverMatch6.1sp3express
OR
beaweblogic_serverMatch6.1sp3win32
OR
beaweblogic_serverMatch6.1sp4
OR
beaweblogic_serverMatch6.1sp4express
OR
beaweblogic_serverMatch6.1sp4win32
OR
beaweblogic_serverMatch6.1sp5
OR
beaweblogic_serverMatch6.1sp5express
OR
beaweblogic_serverMatch6.1sp5win32
OR
beaweblogic_serverMatch6.1sp6win32
OR
beaweblogic_serverMatch6.1sp7
OR
beaweblogic_serverMatch6.1sp7express
OR
beaweblogic_serverMatch6.1sp7win32
OR
beaweblogic_serverMatch7.0
OR
beaweblogic_serverMatch7.0express
OR
beaweblogic_serverMatch7.0win32
OR
beaweblogic_serverMatch7.0sp1
OR
beaweblogic_serverMatch7.0sp1express
OR
beaweblogic_serverMatch7.0sp1win32
OR
beaweblogic_serverMatch7.0sp2
OR
beaweblogic_serverMatch7.0sp2express
OR
beaweblogic_serverMatch7.0sp2win32
OR
beaweblogic_serverMatch7.0sp3
OR
beaweblogic_serverMatch7.0sp3express
OR
beaweblogic_serverMatch7.0sp3win32
OR
beaweblogic_serverMatch7.0sp4
OR
beaweblogic_serverMatch7.0sp4express
OR
beaweblogic_serverMatch7.0sp4win32
OR
beaweblogic_serverMatch7.0sp5
OR
beaweblogic_serverMatch7.0sp5express
OR
beaweblogic_serverMatch7.0sp5win32
OR
beaweblogic_serverMatch7.0sp6
OR
beaweblogic_serverMatch7.0sp6express
OR
beaweblogic_serverMatch7.0sp6win32
OR
beaweblogic_serverMatch8.1
OR
beaweblogic_serverMatch8.1express
OR
beaweblogic_serverMatch8.1win32
OR
beaweblogic_serverMatch8.1sp1
OR
beaweblogic_serverMatch8.1sp1express
OR
beaweblogic_serverMatch8.1sp1win32
OR
beaweblogic_serverMatch8.1sp2
OR
beaweblogic_serverMatch8.1sp2express
OR
beaweblogic_serverMatch8.1sp2win32
OR
beaweblogic_serverMatch8.1sp3
OR
beaweblogic_serverMatch8.1sp3express
OR
beaweblogic_serverMatch8.1sp3win32
OR
beaweblogic_serverMatch8.1sp4
OR
beaweblogic_serverMatch8.1sp4express
OR
beaweblogic_serverMatch8.1sp4win32

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

7.2 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

5.1%

Related for CVE-2005-4762