CVE-2008-0901
Severity CVSS v4.0:
Pending analysis
Type:
CWE-200
Information Leak / Disclosure
Publication date:
22/02/2008
Last modified:
09/04/2025
Description
BEA WebLogic Server and Express 7.0 through 10.0 allows remote attackers to conduct brute force password guessing attacks, even when account lockout has been activated, via crafted URLs that indicate whether a guessed password is successful or not.
Impact
Base Score 2.0
7.10
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:bea:weblogic_server:7.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:bea:weblogic_server:7.0:sp1:*:*:*:*:*:* | ||
| cpe:2.3:a:bea:weblogic_server:7.0:sp2:*:*:*:*:*:* | ||
| cpe:2.3:a:bea:weblogic_server:7.0:sp3:*:*:*:*:*:* | ||
| cpe:2.3:a:bea:weblogic_server:7.0:sp4:*:*:*:*:*:* | ||
| cpe:2.3:a:bea:weblogic_server:7.0:sp5:*:*:*:*:*:* | ||
| cpe:2.3:a:bea:weblogic_server:7.0:sp6:*:*:*:*:*:* | ||
| cpe:2.3:a:bea:weblogic_server:7.0:sp7:*:*:*:*:*:* | ||
| cpe:2.3:a:bea:weblogic_server:8.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:bea:weblogic_server:8.1:sp1:*:*:*:*:*:* | ||
| cpe:2.3:a:bea:weblogic_server:8.1:sp2:*:*:*:*:*:* | ||
| cpe:2.3:a:bea:weblogic_server:8.1:sp3:*:*:*:*:*:* | ||
| cpe:2.3:a:bea:weblogic_server:8.1:sp4:*:*:*:*:*:* | ||
| cpe:2.3:a:bea:weblogic_server:8.1:sp5:*:*:*:*:*:* | ||
| cpe:2.3:a:bea:weblogic_server:8.1:sp6:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://dev2dev.bea.com/pub/advisory/271
- http://secunia.com/advisories/29041
- http://www.s21sec.com/avisos/s21sec-040-en.txt
- http://www.securityfocus.com/archive/1/488686/100/0/threaded
- http://www.securitytracker.com/id?1019449=
- http://www.vupen.com/english/advisories/2008/0612/references
- http://dev2dev.bea.com/pub/advisory/271
- http://secunia.com/advisories/29041
- http://www.s21sec.com/avisos/s21sec-040-en.txt
- http://www.securityfocus.com/archive/1/488686/100/0/threaded
- http://www.securitytracker.com/id?1019449=
- http://www.vupen.com/english/advisories/2008/0612/references



