Vulnerability Description
The JMS Message Bridge in BEA WebLogic Server 7.0 through SP7 and 8.1 through Service Pack 6, when configured without a username and password, or when the connection URL is not defined, allows remote attackers to bypass the security access policy and "send unauthorized messages to a protected queue."
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Bea | Weblogic Server | 7.0 |
References
- http://dev2dev.bea.com/pub/advisory/234PatchVendor Advisory
- http://osvdb.org/36067
- http://secunia.com/advisories/25284Vendor Advisory
- http://securitytracker.com/id?1018057Patch
- http://www.vupen.com/english/advisories/2007/1815
- https://exchange.xforce.ibmcloud.com/vulnerabilities/34287
- http://dev2dev.bea.com/pub/advisory/234PatchVendor Advisory
- http://osvdb.org/36067
- http://secunia.com/advisories/25284Vendor Advisory
- http://securitytracker.com/id?1018057Patch
- http://www.vupen.com/english/advisories/2007/1815
- https://exchange.xforce.ibmcloud.com/vulnerabilities/34287
FAQ
What is CVE-2007-2701?
CVE-2007-2701 is a vulnerability with a CVSS score of 4.6 (MEDIUM). The JMS Message Bridge in BEA WebLogic Server 7.0 through SP7 and 8.1 through Service Pack 6, when configured without a username and password, or when the connection URL is not defined, allows remote ...
How severe is CVE-2007-2701?
CVE-2007-2701 has been rated MEDIUM with a CVSS base score of 4.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-2701?
Check the references section above for vendor advisories and patch information. Affected products include: Bea Weblogic Server.