Get a Pentest and security assessment of your IT network.

News

BEA WebLogic plug-in for Apache JSESSION Cookie overflow

A vulnerability exists in the parsing of the JSESSIONID cookie in the Apache Plug-in connector for BEA Weblogic that can result in a buffer overflow. This vulnerability may be remotely exploitable without authentication, i.e. it may be exploited over a network without the need for a username and password. The only way to get the patch is with a Oracle Support Account. This link is still on most of the BEA weblogic pages. This vulnerability is the result of an incorrectly bounded strncpy that uses the length of the cookie parameter as the amount of data to copy.”]

Source: https://blog.talosintelligence.com/2009/03/bea-weblogic-plug-in-for-apache.html

Related posts
News

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

News

Art of Twitter account hacking

News

SEA has stolen invoices that shows Microsoft charges FBI for user data

News

Greek police arrested a man running the BTC-e Bitcoin exchange to launder more than US$4bn worth of the Bitcoin