{"vuid":"VU#658878","idnumber":"658878","name":"BEA WebLogic Server allows unauthorized removal of EJB objects","keywords":["BEA","WebLogic Server","EJB objects","remove() method","BEA04-57.00"],"overview":"There is a vulnerability in the BEA WebLogic Server that could allow the unauthorized removal of an Enterprise JavaBean (EJB).","clean_desc":"BEA Systems describes WebLogic Server as \"an industrial-strength application infrastructure for developing, integrating, securing, and managing distributed Java applications.\" The WebLogic server supports the use of Enterprise JavaBean (EJB) applications. EJB is a component architecture used for building distributed, object-oriented business applications. When designing an EJB application, there are various methods used to provide an interface with the WebLogic Server. There is a vulnerability in the way WebLogic Server handles calls to the remove() method. When an application implements this remove() method, the application can remove a stateful EJB object from a remote view even if that application does not have permission to remove it. The BEA Security Advisory states that the following versions of WebLogic Server and Express are affected by this vulnerability: WebLogic Server and WebLogic Express version 8.1 through Service Pack 2, on all platforms\nWebLogic Server and WebLogic Express version 7.0 through Service Pack 4, on all platforms\nWebLogic Server and WebLogic Express version 6.1 through Service Pack 6, on all platforms","impact":"Enterprise JavaBean applications implementing the remove() method could allow unauthorized users to remove EJB objects from remote views.","resolution":"Upgrade WebLogic Server and WebLogic Express version 8.1 1. Upgrade to WebLogic Server and WebLogic Express version 8.1 Service Pack 2. 2. Install the patch from: ftp://ftpna.beasys.com/pub/releases/security/CR134122_810sp2.jar WebLogic Server version 8.1 Service Pack 3 will include the functionality in this patch. WebLogic Server and WebLogic Express version 7.0 Upgrade to WebLogic Server and WebLogic Express version 7.0 Service Pack 5. WebLogic Server and WebLogic Express version 6.1 1. Upgrade to WebLogic Server and WebLogic Express version 6.1 Service Pack 6\n2. Install the patch from: ftp://ftpna.beasys.com/pub/releases/security/CR134122_610sp6.jar WebLogic Server version 6.1 Service Pack 7 will include the functionality in this patch.","workarounds":"","sysaffected":"","thanks":"This vulnerability was reported by BEA Systems Inc.","author":"This document was written by Damon Morda.","public":["http://dev2dev.bea.com/resourcelibrary/advisoriesnotifications/BEA04_57.00.jsp","http://secunia.com/advisories/11436/","http://www.securitytracker.com/alerts/2004/Apr/1009897.html","http://www.weblogic.com/docs/techoverview/ejb.html"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2004-04-22T17:54:53Z","publicdate":"2004-04-21T00:00:00Z","datefirstpublished":"2004-04-23T17:52:22Z","dateupdated":"2004-04-23T18:15:16Z","revision":19,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"7","cam_population":"9","cam_impact":"7","cam_easeofexploitation":"15","cam_attackeraccessrequired":"10","cam_scorecurrent":"3.898125","cam_scorecurrentwidelyknown":"4.7840625","cam_scorecurrentwidelyknownexploited":"8.3278125","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":3.898125,"vulnote":null}