Overview
The BEA WebLogic server contains a vulnerability that may allow authenticated users to bypass authentication for a given web application when the application has been updated.
Description
| The BEA WebLogic Server provides a feature that allows it to store user authentication information for future sessions. This product contains a vulnerability that prevents this stored information from being erased when a given web application is updated using "dynamic redeployment". As a result, users who authenticate prior to an update of a web application may be able to bypass authentication when accessing the web application after an update. This vulnerability is particularly significant when the update to a given web application affects its authentication mechanism.  The following scenario provides a possible example of the effects of this vulnerability: 
 | 
Impact
| This vulnerability may allow remote users to bypass the authentication mechanism of a given web application. | 
Solution
| Apply a patch | 
Vendor Information
CVSS Metrics
| Group | Score | Vector | 
|---|---|---|
| Base | ||
| Temporal | ||
| Environmental | 
References
Acknowledgements
The CERT/CC thanks BEA Systems, Inc. for reporting this vulnerability.
This document was written by Jeffrey P. Lanza.
Other Information
| CVE IDs: | None | 
| Severity Metric: | 0.19 | 
| Date Public: | 2003-03-18 | 
| Date First Published: | 2003-03-26 | 
| Date Last Updated: | 2003-03-26 22:27 UTC | 
| Document Revision: | 13 |