Vulnerability Description
The default configuration of BEA WebLogic 3.1.8 through 4.5.1 allows a remote attacker to view source code of a JSP program by requesting a URL which provides the JSP extension in upper case.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Bea | Weblogic Server | All versions |
Related Weaknesses (CWE)
References
- http://archives.neohapsis.com/archives/ntbugtraq/2000-q2/0262.htmBroken Link
- http://developer.bea.com/alerts/security_000612.htmlBroken Link
- http://www.securityfocus.com/bid/1328Broken LinkExploitPatch
- https://exchange.xforce.ibmcloud.com/vulnerabilities/4694Third Party AdvisoryVDB Entry
- http://archives.neohapsis.com/archives/ntbugtraq/2000-q2/0262.htmBroken Link
- http://developer.bea.com/alerts/security_000612.htmlBroken Link
- http://www.securityfocus.com/bid/1328Broken LinkExploitPatch
- https://exchange.xforce.ibmcloud.com/vulnerabilities/4694Third Party AdvisoryVDB Entry
FAQ
What is CVE-2000-0499?
CVE-2000-0499 is a vulnerability with a CVSS score of 7.5 (HIGH). The default configuration of BEA WebLogic 3.1.8 through 4.5.1 allows a remote attacker to view source code of a JSP program by requesting a URL which provides the JSP extension in upper case.
How severe is CVE-2000-0499?
CVE-2000-0499 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2000-0499?
Check the references section above for vendor advisories and patch information. Affected products include: Bea Weblogic Server.