CVE-2007-6197
Summary
| CVE | CVE-2007-6197 |
|---|---|
| State | PUBLISHED |
| Assigner | mitre |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2007-12-01 06:46:00 UTC |
| Updated | 2026-04-23 00:35:47 UTC |
| Description | The Plumtree portal in BEA AquaLogic Interaction 5.0.2 through 5.0.4 and 6.0.1.218452 allows remote attackers to obtain version numbers and internal hostnames by reading comments in the HTML source of any page. |
Risk And Classification
CVSS v2.0 Breakdown
Access Vector
NetworkAccess Complexity
LowAuthentication
NoneConfidentiality
PartialIntegrity
NoneAvailability
NoneAV:N/AC:L/Au:N/C:P/I:N/A:N
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Bea | Aqualogic Interaction | 5.0.2 | All | All | All |
| Application | Bea | Aqualogic Interaction | 5.0.3 | All | All | All |
| Application | Bea | Aqualogic Interaction | 5.0.4 | All | All | All |
| Application | Bea | Aqualogic Interaction | 6.0.1.218452 | All | All | All |
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| ProCheckUp - Security Vulnerabilities 2007 | af854a3a-2127-422b-91ae-364da2661108 | procheckup.com | Exploit |
| BEA AquaLogic Interaction Plumtree Portal Information Disclosure - Advisories - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Patch, Vendor Advisory |
| Webmail - OVH | af854a3a-2127-422b-91ae-364da2661108 | www.vupen.com | |
| BEA Plumtree Portal Discloses Internal Hostname and Product Version Number to Remote Users - SecurityTracker | af854a3a-2127-422b-91ae-364da2661108 | www.securitytracker.com | |
| SecurityFocus | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | |
| ProCheckUp - Security Vulnerabilities 2007 | af854a3a-2127-422b-91ae-364da2661108 | procheckup.com | Exploit |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.