Vulnerability Description
BEA WebLogic Server and Express 7.0 and 7.0.0.1, when using "memory" session persistence for web applications, does not clear authentication information when a web application is redeployed, which could allow users of that application to gain access without having to re-authenticate.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Bea | Weblogic Server | 7.0 |
References
- http://dev2dev.bea.com/resourcelibrary/advisoriesnotifications/BEA03-27.jsp
- http://www.kb.cert.org/vuls/id/691153PatchThird Party AdvisoryUS Government Resource
- http://www.securityfocus.com/bid/7130PatchVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/11555
- http://dev2dev.bea.com/resourcelibrary/advisoriesnotifications/BEA03-27.jsp
- http://www.kb.cert.org/vuls/id/691153PatchThird Party AdvisoryUS Government Resource
- http://www.securityfocus.com/bid/7130PatchVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/11555
FAQ
What is CVE-2003-1095?
CVE-2003-1095 is a vulnerability with a CVSS score of 4.6 (MEDIUM). BEA WebLogic Server and Express 7.0 and 7.0.0.1, when using "memory" session persistence for web applications, does not clear authentication information when a web application is redeployed, which cou...
How severe is CVE-2003-1095?
CVE-2003-1095 has been rated MEDIUM with a CVSS base score of 4.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2003-1095?
Check the references section above for vendor advisories and patch information. Affected products include: Bea Weblogic Server.