Korean
<< Back
VID 22517
Severity 30
Port 80, ...
Protocol TCP
Class Servlet
Detailed Description The version of Oracle WebLogic Server running on the remote host has a session fixation vulnerability.

A remote attacker could exploit this by tricking a user into making a specially crafted POST request. This would allow the attacker to hijack the user's session.

* Note: This check solely relied on the version number of the remote WebLogic server to assess this vulnerability, so this might be a false positive.

* References:
http://malerisch.net/docs/advisories/Oracle_WebLogic_Session_Fixation_Via_HTTP_POST_Request.html
http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html

* Platforms Affected:
Oracle Weblogic Server 10.3.3
Oracle Weblogic Server 10.3.2
Oracle Weblogic Server 10.3.1
Oracle Weblogic Server 9.2.4
Oracle Weblogic Server 9.2 MP3
Oracle Weblogic Server 9.2 MP2
Oracle Weblogic Server 9.2 MP1
Oracle Weblogic Server 9.2
Oracle Weblogic Server 9.1 GA
Oracle Weblogic Server 9.1
Oracle Weblogic Server 9.0 GA
Oracle Weblogic Server 10.3
Oracle Weblogic Server 10.1
Oracle Weblogic Server 10.0 MP2
Oracle Weblogic Server 10.0 MP1
Oracle Weblogic Server 10
Any operating system Any version
Recommendation Oracle has released a Critical Patch Update to address these issues. Information regarding obtaining and applying an appropriate patch can be found in the Oracle Critical Patch Update Advisory dated January 2011 at http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html
Related URL CVE-2010-4437 (CVE)
Related URL 45852 (SecurityFocus)
Related URL (ISS)