CVE-2007-2705
Summary
| CVE | CVE-2007-2705 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2007-05-16 01:19:00 UTC |
| Updated | 2017-07-29 01:31:00 UTC |
| Description | Directory traversal vulnerability in the Test View Console in BEA WebLogic Integration 9.2 before SP1 and WebLogic Workshop 8.1 SP2 through SP6, when "deployed in an exploded format," allows remote attackers to list a WebLogic Workshop Directory (wlwdir) parent directory via unspecified vectors. |
Risk And Classification
Problem Types: NVD-CWE-Other
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Bea | Weblogic Integration | 9.2 | All | All | All |
| Application | Bea | Weblogic Integration | 9.2 | All | All | All |
| Application | Bea | Weblogic Workshop | 8.1 | sp2 | All | All |
| Application | Bea | Weblogic Workshop | 8.1 | sp3 | All | All |
| Application | Bea | Weblogic Workshop | 8.1 | sp4 | All | All |
| Application | Bea | Weblogic Workshop | 8.1 | sp5 | All | All |
| Application | Bea | Weblogic Workshop | 8.1 | sp6 | All | All |
| Application | Bea | Weblogic Workshop | 8.1 | sp2 | All | All |
| Application | Bea | Weblogic Workshop | 8.1 | sp3 | All | All |
| Application | Bea | Weblogic Workshop | 8.1 | sp4 | All | All |
| Application | Bea | Weblogic Workshop | 8.1 | sp5 | All | All |
| Application | Bea | Weblogic Workshop | 8.1 | sp6 | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | VUPEN | www.vupen.com | |
| BEA WebLogic Integration Directory Traversal Bug Lets Remote Users List Certain Directories - SecurityTracker | SECTRACK | www.securitytracker.com | |
| 36063 | OSVDB | osvdb.org | |
| IBM X-Force Exchange | XF | exchange.xforce.ibmcloud.com | |
| Exposure of filenames in development mode | BEA | dev2dev.bea.com | Patch, Vendor Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.