Vulnerability Name:

CVE-2005-2680 (CCN-21971)

Assigned:2005-08-23
Published:2005-08-23
Updated:2018-10-30
Summary:Unspecified vulnerability in BEA WebLogic Portal 8.1 through SP4, when using entitlements, allows remote attackers to bypass access restrictions for the pages of a Book via crafted URLs.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): None
Availibility (A): None
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
Vulnerability Type:CWE-Other
Vulnerability Consequences:Bypass Security
References:Source: MITRE
Type: CNA
CVE-2005-2680

Source: BEA
Type: Patch, Vendor Advisory
BEA05-84.00

Source: CCN
Type: BEA Systems Inc. Web site
BEA Product Documentation

Source: CCN
Type: SA16538
BEA WebLogic Portal User-Entitlement Security Bypass

Source: CCN
Type: SECTRACK ID: 1014759
WebLogic Portal Access Control Flaw May Grant Remote Users Access to Entitled Pages

Source: CCN
Type: OSVDB ID: 18923
BEA WebLogic Portal User-Entitlement Crafter URL Bypass

Source: CCN
Type: BID-14632
BEA WebLogic Portal Access Validation Vulnerability

Source: XF
Type: UNKNOWN
weblogic-user-authorization-security-bypass(21971)

Source: CCN
Type: BEA Security Advisory BEA05-84.00
A patch is available to enforce correct access restrictions

Vulnerable Configuration:Configuration 1:
  • cpe:/a:oracle:weblogic_portal:8.1:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:weblogic_portal:8.1:sp1:*:*:*:*:*:*
  • OR cpe:/a:oracle:weblogic_portal:8.1:sp2:*:*:*:*:*:*
  • OR cpe:/a:oracle:weblogic_portal:8.1:sp3:*:*:*:*:*:*
  • OR cpe:/a:oracle:weblogic_portal:8.1:sp4:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:oracle:weblogic_portal:8.1:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:weblogic_portal:8.1:sp1:*:*:*:*:*:*
  • OR cpe:/a:oracle:weblogic_portal:8.1:sp2:*:*:*:*:*:*
  • OR cpe:/a:oracle:weblogic_portal:8.1:sp3:*:*:*:*:*:*
  • OR cpe:/a:oracle:weblogic_portal:8.1:sp4:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    oracle weblogic portal 8.1
    oracle weblogic portal 8.1 sp1
    oracle weblogic portal 8.1 sp2
    oracle weblogic portal 8.1 sp3
    oracle weblogic portal 8.1 sp4
    oracle weblogic portal 8.1
    oracle weblogic portal 8.1 sp1
    oracle weblogic portal 8.1 sp2
    oracle weblogic portal 8.1 sp3
    oracle weblogic portal 8.1 sp4