Remote code execution in Oracle WebLogic Server

Published: 2019-04-26 19:30:23 | Updated: 2019-06-11
Severity High
Patch available YES
Number of vulnerabilities 1
CVE ID CVE-2019-2725
CVSSv3 9.1 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C]
CWE ID CWE-502
Exploitation vector Network
Public exploit Public exploit code for vulnerability #1 is available.
Vulnerable software Oracle WebLogic Server
Vulnerable software versions Oracle WebLogic Server 12.2.1.3
Oracle WebLogic Server 10.3.6.0
Oracle WebLogic Server 12.2.1.2.0

Show more

Vendor URL Oracle

Security Advisory

1) Insecure deserialization

Description

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to insecure deserialization of untrusted data within the "wls9_async_response.war" and "wls-wsat.war" components. A remote non-authenticated attacker can send a specially crafted HTTP request to "/_async/*" and "/wls-wsat/*" URLs and execute arbitrary code on the target system.

Remediation

Install patch from vendor's website.

External links

https://medium.com/@knownseczoomeye/knownsec-404-team-oracle-weblogic-deserialization-rce-vulnerability-0day-alert-90dd9a79ae93
http://www.cnvd.org.cn/webinfo/show/4989
https://www.oracle.com/technetwork/security-advisory/alert-cve-2019-2725-5466295.html

Back to List