Check Point Reference: | CPAI-2005-250 |
Date Published: | 27 Oct 2009 |
Severity: | High |
Last Updated: | Tuesday 27 October, 2009 |
Source: | |
Industry Reference: | CVE-2005-1747 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | |
Vulnerability Description | BEA WebLogic Server is an enterprise-class Java Application Server platform. WebLogic is typically used as the platform for large enterprise web applications. To reduce management complexity in large installations, WebLogic Servers are grouped into domains. A WebLogic Server domain is a logically related group of WebLogic Server instances and related resources that are managed as one unit. A cross site scripting vulnerability exists in the Admin Console program of BEA WebLogic products. By persuading a WebLogic administrator to follow specially crafted Admin Console links, an attacker can inject arbitrary HTML content into pages returned by the WebLogic server. Successful exploitation can disclose privileged credentials of the targeted WebLogic server to the attacker. Exploiting this vulnerability allows for the disclosure of the WebLogic server administrator's username, password or session cookies to the attacker, compromising an administrator account. Using the compromised administrator account, the attacker can fully control the WebLogic servers in the domain. |
This protection will detect and block attempts to exploit this vulnerability
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: Web Server Enforcement Violation.
Attack Information: BEA WebLogic Admin Console cross site scripting