Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-8f4j-6g66-v4jj

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The JMS Message Bridge in BEA WebLogic Server 7.0 through SP7 and 8.1 through Service Pack 6, when configured without a username and password, or when the connection URL is not defined, allows remote attackers to bypass the security access policy and "send unauthorized messages to a protected queue."

The JMS Message Bridge in BEA WebLogic Server 7.0 through SP7 and 8.1 through Service Pack 6, when configured without a username and password, or when the connection URL is not defined, allows remote attackers to bypass the security access policy and "send unauthorized messages to a protected queue."

EPSS

Процентиль: 68%
0.00578
Низкий

Связанные уязвимости

nvd
больше 18 лет назад

The JMS Message Bridge in BEA WebLogic Server 7.0 through SP7 and 8.1 through Service Pack 6, when configured without a username and password, or when the connection URL is not defined, allows remote attackers to bypass the security access policy and "send unauthorized messages to a protected queue."

EPSS

Процентиль: 68%
0.00578
Низкий