Vulnerability Name: | CVE-2001-1477 (CCN-6326) | ||||||||
Assigned: | 2001-04-04 | ||||||||
Published: | 2001-04-04 | ||||||||
Updated: | 2017-07-11 | ||||||||
Summary: | The Domain gateway in BEA Tuxedo 7.1 does not perform authorization checks for imported services and qspaces on remote domains, even when an ACL exists, which allows users to access services in a remote domain. | ||||||||
CVSS v3 Severity: | 5.9 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||
CVSS v2 Severity: | 4.6 Medium (CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||
Vulnerability Type: | CWE-Other | ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: MITRE Type: CNA CVE-2001-1477 Source: CONFIRM Type: Patch http://dev2dev.bea.com/resourcelibrary/advisoriesnotifications/BEA00-08.jsp Source: CCN Type: BEA Systems, Inc. Security Advisory BEA00-08.00 Patch Available for Access Control Vulnerability in BEA Tuxedo Source: CCN Type: OSVDB ID: 18593 BEA Tuxedo Domain Gateway Remote Domain ACL Bypass Source: XF Type: UNKNOWN bea-tuxedo-remote-access(6326) Source: XF Type: UNKNOWN bea-tuxedo-remote-access(6326) | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
BACK |