255 lines
9.7 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2007-2697",
"sourceIdentifier": "cve@mitre.org",
"published": "2007-05-16T01:19:00.000",
"lastModified": "2017-07-29T01:31:39.783",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "The embedded LDAP server in BEA WebLogic Express and WebLogic Server 7.0 through SP6, 8.1 through SP5, 9.0, and 9.1, when in certain configurations, does not limit or audit failed authentication attempts, which allows remote attackers to more easily conduct brute-force attacks against the administrator password, or flood the server with login attempts and cause a denial of service."
},
{
"lang": "es",
"value": "El servidor LDAP embebido en BEA WebLogic Express y WebLogic Server 7.0 hasta SP6, 8.1 hasta SP5, 9.0, y 9.1, en configuraciones concretas, no limita o monitoriza intentos fallidos de autenticaci\u00f3n, lo cual permite a atacantes remotos llevar a cabo ataques de fuerza bruta contra la contrase\u00f1a del administrador m\u00e1s f\u00e1cilmente, o inundar el servidor con intentos de identificaci\u00f3n y causar una denegaci\u00f3n de servicio."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "HIGH",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 4.9,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bea:weblogic_server:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F9C5AFCF-79D8-4005-B800-B0C6BD461276"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bea:weblogic_server:7.0:*:express:*:*:*:*:*",
"matchCriteriaId": "FBDF3AC0-0680-4EEE-898C-47D194667BE2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bea:weblogic_server:7.0:sp1:*:*:*:*:*:*",
"matchCriteriaId": "6828CE4B-91E8-4688-977F-DC7BC21131C8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bea:weblogic_server:7.0:sp1:express:*:*:*:*:*",
"matchCriteriaId": "BBDB9094-78E8-4CBF-9F5F-321D5174F1EC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bea:weblogic_server:7.0:sp2:*:*:*:*:*:*",
"matchCriteriaId": "E141AA86-C6D0-4FA8-9268-0FB0635DF9CF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bea:weblogic_server:7.0:sp2:express:*:*:*:*:*",
"matchCriteriaId": "6FB8930F-C6D8-40B9-8D08-751F5B47229B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bea:weblogic_server:7.0:sp3:*:*:*:*:*:*",
"matchCriteriaId": "893D9D88-43C4-4F9F-A364-0585DE6FA9E9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bea:weblogic_server:7.0:sp3:express:*:*:*:*:*",
"matchCriteriaId": "D59F9859-7344-43F0-9348-E57FABB9E431"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bea:weblogic_server:7.0:sp4:*:*:*:*:*:*",
"matchCriteriaId": "D34E2925-DE2A-437F-B349-BD7103F4C37E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bea:weblogic_server:7.0:sp4:express:*:*:*:*:*",
"matchCriteriaId": "0A4EC87D-EF83-48C5-B516-A6A482D9F525"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bea:weblogic_server:7.0:sp5:*:*:*:*:*:*",
"matchCriteriaId": "16E3F943-D920-4C0A-8545-5CF7D792011F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bea:weblogic_server:7.0:sp5:express:*:*:*:*:*",
"matchCriteriaId": "6BBA04D4-BA2E-4495-85DE-38918A878012"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bea:weblogic_server:7.0:sp6:*:*:*:*:*:*",
"matchCriteriaId": "B46A3EBE-B268-427E-AAB5-62DDF255F1D1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bea:weblogic_server:7.0:sp6:express:*:*:*:*:*",
"matchCriteriaId": "A3024422-1CA9-4E5D-80D1-2F4B57FDAEBA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bea:weblogic_server:7.0:sp7:express:*:*:*:*:*",
"matchCriteriaId": "596178D8-B7BB-4793-81C1-119ED353CF2D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bea:weblogic_server:8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E08D4CEA-9ACC-4869-BC87-3524A059914F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bea:weblogic_server:8.1:*:express:*:*:*:*:*",
"matchCriteriaId": "ADED8968-EA9C-4F0E-AD2F-BC834F4D8A58"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bea:weblogic_server:8.1:sp1:*:*:*:*:*:*",
"matchCriteriaId": "6F5B2A06-CE19-4A57-9566-09FC1E259CDB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bea:weblogic_server:8.1:sp1:express:*:*:*:*:*",
"matchCriteriaId": "F7560131-A6AC-4BBB-AA2D-C7C63AB51226"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bea:weblogic_server:8.1:sp2:*:*:*:*:*:*",
"matchCriteriaId": "D18E22CC-A0FC-4BC7-AD39-2645F57486C1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bea:weblogic_server:8.1:sp2:express:*:*:*:*:*",
"matchCriteriaId": "893C2387-03E3-4F8E-9029-BC64C64239EF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bea:weblogic_server:8.1:sp3:*:*:*:*:*:*",
"matchCriteriaId": "9429D939-FCC4-4BA7-90C4-BBEECE7309D0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bea:weblogic_server:8.1:sp3:express:*:*:*:*:*",
"matchCriteriaId": "55661356-58E0-49D3-9C79-B4BB5EBE24CF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bea:weblogic_server:8.1:sp4:*:*:*:*:*:*",
"matchCriteriaId": "0653ACAC-B0D9-4381-AB23-11D24852A414"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bea:weblogic_server:8.1:sp4:express:*:*:*:*:*",
"matchCriteriaId": "107C2FC6-BC60-4817-8A21-14C81DA6DEF5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bea:weblogic_server:8.1:sp5:*:*:*:*:*:*",
"matchCriteriaId": "2A489A8E-D3AE-42DF-8DCF-5A9EF10778FA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bea:weblogic_server:8.1:sp5:express:*:*:*:*:*",
"matchCriteriaId": "24E0BA12-971C-4DC4-8ED2-9B7DCD6390E7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bea:weblogic_server:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3CA97F1A-49F7-4511-8959-D62155491DF5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bea:weblogic_server:9.0:*:express:*:*:*:*:*",
"matchCriteriaId": "0EDB38AA-CAC4-4C89-8484-7C2A75F8038F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bea:weblogic_server:9.0:ga:*:*:*:*:*:*",
"matchCriteriaId": "98F632B9-0572-4563-BA41-262628A5CB7A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bea:weblogic_server:9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DCAAE8F1-CB25-4871-BE48-ABF7DFAD8AD6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bea:weblogic_server:9.1:*:express:*:*:*:*:*",
"matchCriteriaId": "17280B97-D499-434E-BD89-FD348E9E2E0C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bea:weblogic_server:9.1:ga:*:*:*:*:*:*",
"matchCriteriaId": "A585B339-442B-4408-9A44-E872FF4406A8"
}
]
}
]
}
],
"references": [
{
"url": "http://dev2dev.bea.com/pub/advisory/229",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://securitytracker.com/id?1018057",
"source": "cve@mitre.org"
},
{
"url": "http://www.vupen.com/english/advisories/2007/1815",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34291",
"source": "cve@mitre.org"
}
]
}