The JMS Message Bridge in BEA WebLogic Server 7.0 through SP7 and 8.1 through Service Pack 6, when configured without a username and password, or when the connection URL is not defined, allows remote attackers to bypass the security access policy and "send unauthorized messages to a protected queue."
Link | Tags |
---|---|
http://dev2dev.bea.com/pub/advisory/234 | patch vendor advisory |
http://securitytracker.com/id?1018057 | vdb entry patch |
http://secunia.com/advisories/25284 | third party advisory vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/34287 | vdb entry |
http://www.vupen.com/english/advisories/2007/1815 | vdb entry |
http://osvdb.org/36067 | vdb entry |