CVE-2007-2697 (GCVE-0-2007-2697)
Vulnerability from cvelistv5 – Published: 2007-05-16 01:00 – Updated: 2024-08-07 13:49
VLAI?
Summary
The embedded LDAP server in BEA WebLogic Express and WebLogic Server 7.0 through SP6, 8.1 through SP5, 9.0, and 9.1, when in certain configurations, does not limit or audit failed authentication attempts, which allows remote attackers to more easily conduct brute-force attacks against the administrator password, or flood the server with login attempts and cause a denial of service.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T13:49:57.266Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "BEA07-161.00",
"tags": [
"vendor-advisory",
"x_refsource_BEA",
"x_transferred"
],
"url": "http://dev2dev.bea.com/pub/advisory/229"
},
{
"name": "1018057",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1018057"
},
{
"name": "25284",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/25284"
},
{
"name": "ADV-2007-1815",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2007/1815"
},
{
"name": "36072",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/36072"
},
{
"name": "weblogic-ldap-brute-force(34291)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34291"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2007-05-14T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The embedded LDAP server in BEA WebLogic Express and WebLogic Server 7.0 through SP6, 8.1 through SP5, 9.0, and 9.1, when in certain configurations, does not limit or audit failed authentication attempts, which allows remote attackers to more easily conduct brute-force attacks against the administrator password, or flood the server with login attempts and cause a denial of service."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-28T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "BEA07-161.00",
"tags": [
"vendor-advisory",
"x_refsource_BEA"
],
"url": "http://dev2dev.bea.com/pub/advisory/229"
},
{
"name": "1018057",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1018057"
},
{
"name": "25284",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/25284"
},
{
"name": "ADV-2007-1815",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2007/1815"
},
{
"name": "36072",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/36072"
},
{
"name": "weblogic-ldap-brute-force(34291)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34291"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2007-2697",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The embedded LDAP server in BEA WebLogic Express and WebLogic Server 7.0 through SP6, 8.1 through SP5, 9.0, and 9.1, when in certain configurations, does not limit or audit failed authentication attempts, which allows remote attackers to more easily conduct brute-force attacks against the administrator password, or flood the server with login attempts and cause a denial of service."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "BEA07-161.00",
"refsource": "BEA",
"url": "http://dev2dev.bea.com/pub/advisory/229"
},
{
"name": "1018057",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1018057"
},
{
"name": "25284",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25284"
},
{
"name": "ADV-2007-1815",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/1815"
},
{
"name": "36072",
"refsource": "OSVDB",
"url": "http://osvdb.org/36072"
},
{
"name": "weblogic-ldap-brute-force(34291)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34291"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2007-2697",
"datePublished": "2007-05-16T01:00:00",
"dateReserved": "2007-05-15T00:00:00",
"dateUpdated": "2024-08-07T13:49:57.266Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2007-2697\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2007-05-16T01:19:00.000\",\"lastModified\":\"2025-04-09T00:30:58.490\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The embedded LDAP server in BEA WebLogic Express and WebLogic Server 7.0 through SP6, 8.1 through SP5, 9.0, and 9.1, when in certain configurations, does not limit or audit failed authentication attempts, which allows remote attackers to more easily conduct brute-force attacks against the administrator password, or flood the server with login attempts and cause a denial of service.\"},{\"lang\":\"es\",\"value\":\"El servidor LDAP embebido en BEA WebLogic Express y WebLogic Server 7.0 hasta SP6, 8.1 hasta SP5, 9.0, y 9.1, en configuraciones concretas, no limita o monitoriza intentos fallidos de autenticaci\u00f3n, lo cual permite a atacantes remotos llevar a cabo ataques de fuerza bruta contra la contrase\u00f1a del administrador m\u00e1s f\u00e1cilmente, o inundar el servidor con intentos de identificaci\u00f3n y causar una denegaci\u00f3n de servicio.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:H/Au:N/C:P/I:P/A:P\",\"baseScore\":5.1,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"HIGH\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":4.9,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bea:weblogic_server:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9C5AFCF-79D8-4005-B800-B0C6BD461276\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bea:weblogic_server:7.0:*:express:*:*:*:*:*\",\"matchCriteriaId\":\"FBDF3AC0-0680-4EEE-898C-47D194667BE2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bea:weblogic_server:7.0:sp1:*:*:*:*:*:*\",\"matchCriteriaId\":\"6828CE4B-91E8-4688-977F-DC7BC21131C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bea:weblogic_server:7.0:sp1:express:*:*:*:*:*\",\"matchCriteriaId\":\"BBDB9094-78E8-4CBF-9F5F-321D5174F1EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bea:weblogic_server:7.0:sp2:*:*:*:*:*:*\",\"matchCriteriaId\":\"E141AA86-C6D0-4FA8-9268-0FB0635DF9CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bea:weblogic_server:7.0:sp2:express:*:*:*:*:*\",\"matchCriteriaId\":\"6FB8930F-C6D8-40B9-8D08-751F5B47229B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bea:weblogic_server:7.0:sp3:*:*:*:*:*:*\",\"matchCriteriaId\":\"893D9D88-43C4-4F9F-A364-0585DE6FA9E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bea:weblogic_server:7.0:sp3:express:*:*:*:*:*\",\"matchCriteriaId\":\"D59F9859-7344-43F0-9348-E57FABB9E431\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bea:weblogic_server:7.0:sp4:*:*:*:*:*:*\",\"matchCriteriaId\":\"D34E2925-DE2A-437F-B349-BD7103F4C37E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bea:weblogic_server:7.0:sp4:express:*:*:*:*:*\",\"matchCriteriaId\":\"0A4EC87D-EF83-48C5-B516-A6A482D9F525\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bea:weblogic_server:7.0:sp5:*:*:*:*:*:*\",\"matchCriteriaId\":\"16E3F943-D920-4C0A-8545-5CF7D792011F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bea:weblogic_server:7.0:sp5:express:*:*:*:*:*\",\"matchCriteriaId\":\"6BBA04D4-BA2E-4495-85DE-38918A878012\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bea:weblogic_server:7.0:sp6:*:*:*:*:*:*\",\"matchCriteriaId\":\"B46A3EBE-B268-427E-AAB5-62DDF255F1D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bea:weblogic_server:7.0:sp6:express:*:*:*:*:*\",\"matchCriteriaId\":\"A3024422-1CA9-4E5D-80D1-2F4B57FDAEBA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bea:weblogic_server:7.0:sp7:express:*:*:*:*:*\",\"matchCriteriaId\":\"596178D8-B7BB-4793-81C1-119ED353CF2D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bea:weblogic_server:8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E08D4CEA-9ACC-4869-BC87-3524A059914F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bea:weblogic_server:8.1:*:express:*:*:*:*:*\",\"matchCriteriaId\":\"ADED8968-EA9C-4F0E-AD2F-BC834F4D8A58\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bea:weblogic_server:8.1:sp1:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F5B2A06-CE19-4A57-9566-09FC1E259CDB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bea:weblogic_server:8.1:sp1:express:*:*:*:*:*\",\"matchCriteriaId\":\"F7560131-A6AC-4BBB-AA2D-C7C63AB51226\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bea:weblogic_server:8.1:sp2:*:*:*:*:*:*\",\"matchCriteriaId\":\"D18E22CC-A0FC-4BC7-AD39-2645F57486C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bea:weblogic_server:8.1:sp2:express:*:*:*:*:*\",\"matchCriteriaId\":\"893C2387-03E3-4F8E-9029-BC64C64239EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bea:weblogic_server:8.1:sp3:*:*:*:*:*:*\",\"matchCriteriaId\":\"9429D939-FCC4-4BA7-90C4-BBEECE7309D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bea:weblogic_server:8.1:sp3:express:*:*:*:*:*\",\"matchCriteriaId\":\"55661356-58E0-49D3-9C79-B4BB5EBE24CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bea:weblogic_server:8.1:sp4:*:*:*:*:*:*\",\"matchCriteriaId\":\"0653ACAC-B0D9-4381-AB23-11D24852A414\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bea:weblogic_server:8.1:sp4:express:*:*:*:*:*\",\"matchCriteriaId\":\"107C2FC6-BC60-4817-8A21-14C81DA6DEF5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bea:weblogic_server:8.1:sp5:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A489A8E-D3AE-42DF-8DCF-5A9EF10778FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bea:weblogic_server:8.1:sp5:express:*:*:*:*:*\",\"matchCriteriaId\":\"24E0BA12-971C-4DC4-8ED2-9B7DCD6390E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bea:weblogic_server:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CA97F1A-49F7-4511-8959-D62155491DF5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bea:weblogic_server:9.0:*:express:*:*:*:*:*\",\"matchCriteriaId\":\"0EDB38AA-CAC4-4C89-8484-7C2A75F8038F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bea:weblogic_server:9.0:ga:*:*:*:*:*:*\",\"matchCriteriaId\":\"98F632B9-0572-4563-BA41-262628A5CB7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bea:weblogic_server:9.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCAAE8F1-CB25-4871-BE48-ABF7DFAD8AD6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bea:weblogic_server:9.1:*:express:*:*:*:*:*\",\"matchCriteriaId\":\"17280B97-D499-434E-BD89-FD348E9E2E0C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bea:weblogic_server:9.1:ga:*:*:*:*:*:*\",\"matchCriteriaId\":\"A585B339-442B-4408-9A44-E872FF4406A8\"}]}]}],\"references\":[{\"url\":\"http://dev2dev.bea.com/pub/advisory/229\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://osvdb.org/36072\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/25284\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://securitytracker.com/id?1018057\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/1815\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/34291\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://dev2dev.bea.com/pub/advisory/229\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://osvdb.org/36072\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/25284\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securitytracker.com/id?1018057\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/1815\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/34291\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…