CVE-2004-0711
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
27/07/2004
Last modified:
03/04/2025
Description
The URL pattern matching feature in BEA WebLogic Server 6.x matches illegal patterns ending in "*" as wildcards as if they were the legal "/*" pattern, which could cause WebLogic 7.x to allow remote attackers to bypass intended access restrictions because the illegal patterns are properly rejected.
Impact
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:bea:weblogic_server:7.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:bea:weblogic_server:7.0:*:express:*:*:*:*:* | ||
| cpe:2.3:a:bea:weblogic_server:7.0:*:win32:*:*:*:*:* | ||
| cpe:2.3:a:bea:weblogic_server:7.0:sp1:*:*:*:*:*:* | ||
| cpe:2.3:a:bea:weblogic_server:7.0:sp1:express:*:*:*:*:* | ||
| cpe:2.3:a:bea:weblogic_server:7.0:sp1:win32:*:*:*:*:* | ||
| cpe:2.3:a:bea:weblogic_server:7.0:sp2:*:*:*:*:*:* | ||
| cpe:2.3:a:bea:weblogic_server:7.0:sp2:express:*:*:*:*:* | ||
| cpe:2.3:a:bea:weblogic_server:7.0:sp2:win32:*:*:*:*:* | ||
| cpe:2.3:a:bea:weblogic_server:7.0:sp3:*:*:*:*:*:* | ||
| cpe:2.3:a:bea:weblogic_server:7.0:sp3:express:*:*:*:*:* | ||
| cpe:2.3:a:bea:weblogic_server:7.0:sp3:win32:*:*:*:*:* | ||
| cpe:2.3:a:bea:weblogic_server:7.0:sp4:*:*:*:*:*:* | ||
| cpe:2.3:a:bea:weblogic_server:7.0:sp4:express:*:*:*:*:* | ||
| cpe:2.3:a:bea:weblogic_server:7.0:sp4:win32:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://dev2dev.bea.com/resourcelibrary/advisoriesnotifications/BEA04_56.00.jsp
- http://www.kb.cert.org/vuls/id/184558
- http://www.securityfocus.com/bid/10184
- https://exchange.xforce.ibmcloud.com/vulnerabilities/15927
- http://dev2dev.bea.com/resourcelibrary/advisoriesnotifications/BEA04_56.00.jsp
- http://www.kb.cert.org/vuls/id/184558
- http://www.securityfocus.com/bid/10184
- https://exchange.xforce.ibmcloud.com/vulnerabilities/15927



