Overview
BEA WebLogic Server stores the administrator password used to boot the server in clear text within the config.xml file.
Description
| BEA Systems describes WebLogic Server as "an industrial-strength application infrastructure for developing, integrating, securing, and managing distributed Java applications." There is a vulnerability in the way BEA Weblogic Server stores the administrative password used to boot the server. According to the BEA Security Advisory,  
 | 
Impact
| A user with access to the config.xml file may acquire the administrator password used to boot the server. The user could subsequently use this password to impersonate an administrator. | 
Solution
| Apply PatchBEA has released an advisory to address this issue. According to the BEA Security Advisory, it is recommended that users upgrade to Service Pack 2. | 
Vendor Information
CVSS Metrics
| Group | Score | Vector | 
|---|---|---|
| Base | ||
| Temporal | ||
| Environmental | 
References
Acknowledgements
This vulnerability was reported by BEA Systems Inc.
This document was written by Lucy Crocker.
Other Information
| CVE IDs: | None | 
| Severity Metric: | 7.24 | 
| Date Public: | 2004-01-27 | 
| Date First Published: | 2004-04-12 | 
| Date Last Updated: | 2004-04-14 16:20 UTC | 
| Document Revision: | 12 |