Vulnerability Name:

CVE-2000-0500 (CCN-4775)

Assigned:2000-06-21
Published:2000-06-21
Updated:2017-10-10
Summary:The default configuration of BEA WebLogic 5.1.0 allows a remote attacker to view source code of programs by requesting a URL beginning with /file/, which causes the default servlet to display the file without further processing.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): None
Availibility (A): None
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
Vulnerability Type:CWE-Other
Vulnerability Consequences:File Manipulation
References:Source: CCN
Type: BugTraq Mailing List, Wed Jun 21 2000 - 01:36:25 CDT
BEA WebLogic /file/ showcode vulnerability

Source: MITRE
Type: CNA
CVE-2000-0500

Source: BUGTRAQ
Type: UNKNOWN
20000621 BEA WebLogic /file/ showcode vulnerability

Source: CCN
Type: OSVDB ID: 1414
BEA WebLogic Server/Express file Servlet Source Code Disclosure

Source: BID
Type: Exploit, Patch, Vendor Advisory
1378

Source: CCN
Type: BID-1378
BEA Systems WebLogic Server and Express Source Code Disclosure Vulnerability

Source: CONFIRM
Type: UNKNOWN
http://www.weblogic.com/docs51/admindocs/http.html#file

Source: CCN
Type: BEA WebLogic Server 5.1 Web site
WebLogic Server JSP Configuration

Source: XF
Type: UNKNOWN
weblogic-file-source-read(4775)

Source: XF
Type: UNKNOWN
weblogic-file-source-read(4775)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:bea:weblogic_server:3.1.8:*:*:*:*:*:*:*
  • OR cpe:/a:bea:weblogic_server:3.1.8:*:express:*:*:*:*:*
  • OR cpe:/a:bea:weblogic_server:4.0:*:*:*:*:*:*:*
  • OR cpe:/a:bea:weblogic_server:4.0:*:express:*:*:*:*:*
  • OR cpe:/a:bea:weblogic_server:4.5:*:*:*:*:*:*:*
  • OR cpe:/a:bea:weblogic_server:4.5:*:express:*:*:*:*:*
  • OR cpe:/a:bea:weblogic_server:5.1:*:*:*:*:*:*:*
  • OR cpe:/a:bea:weblogic_server:5.1:*:express:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:oracle:weblogic_server:5.1:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:weblogic_server:4.0:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:weblogic_server:4.5:*:*:*:*:*:*:*
  • AND
  • cpe:/o:redhat:linux:*:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    bea weblogic server 3.1.8
    bea weblogic server 3.1.8
    bea weblogic server 4.0
    bea weblogic server 4.0
    bea weblogic server 4.5
    bea weblogic server 4.5
    bea weblogic server 5.1
    bea weblogic server 5.1
    oracle weblogic server 5.1
    oracle weblogic server 4.0
    oracle weblogic server 4.5
    redhat linux *