BEA WebLogic Portal 10.0 and 9.2 through Maintenance Pack 2, under certain circumstances, can redirect a user from the https:// URI for the Portal Administration Console to an http URI, which allows remote attackers to sniff the session.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Link | Tags |
---|---|
http://www.vupen.com/english/advisories/2008/0613 | vdb entry |
http://dev2dev.bea.com/pub/advisory/264 | patch vendor advisory |
http://secunia.com/advisories/29041 | third party advisory |
http://www.securitytracker.com/id?1019442 | vdb entry |