Description
BEA WebLogic 5.1.x does not properly restrict access to the PageCompileServlet, which could allow remote attackers to compile and execute Java JHTML code by directly invoking the servlet on any source file.
Exploits (1)
exploitdb
WRITEUP
VERIFIED
by Foundstone Inc. · textremotewindows
https://www.exploit-db.com/exploits/20125
References (3)
Core 3
Core References
Various Sources x_refsource_confirm
http://developer.bea.com/alerts/security_000731.html
Patch, Vendor Advisory mailing-list
x_refsource_bugtraq
http://archives.neohapsis.com/archives/bugtraq/2000-07/0434.html
Exploit, Patch, Vendor Advisory vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/1525
Scores
EPSS
0.0520
EPSS Percentile
90.0%
Details
Status
published
Products (3)
bea/weblogic_server
3.1.8
bea/weblogic_server
4.0.4
bea/weblogic_server
4.5.1
Published
Oct 20, 2000
Tracked Since
Feb 18, 2026