SB2019071657 - Multiple vulnerabilities in Oracle WebLogic Server
Published: July 16, 2019
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 5 secuirty vulnerabilities.
1) Improper input validation (CVE-ID: CVE-2019-2827)
The vulnerability allows a remote privileged user to read and manipulate data.
The vulnerability exists due to improper input validation within the WLS Core Components component in Oracle WebLogic Server. A remote privileged user can exploit this vulnerability to read and manipulate data.
2) Improper input validation (CVE-ID: CVE-2019-2824)
The vulnerability allows a remote privileged user to read and manipulate data.
The vulnerability exists due to improper input validation within the WLS Core Components component in Oracle WebLogic Server. A remote privileged user can exploit this vulnerability to read and manipulate data.
3) Cross-site scripting (CVE-ID: CVE-2016-7103)
Vulnerability allows a remote attacker to perform XSS attacks.
The vulnerability is caused by an input validation error in jQuery UI before 1.12.0. A remote authenticated attacker can trick the victim to follow a specially specially crafted link and execute arbitrary HTML and script code in victim's browser in security context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
4) Improper input validation (CVE-ID: CVE-2018-15756)
The vulnerability allows a remote attacker to cause DoS condition on the target system.
The vulnerability exists in Pivotal Software Spring Framework due to improper handling of range requests. A remote attacker can send a specially crafted request that contains an additional range header with a high number of ranges or with wide ranges that overlap and cause the service to crash.
5) Improper input validation (CVE-ID: CVE-2019-2856)
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
The vulnerability exists due to improper input validation within the Application Container - JavaEE component in Oracle WebLogic Server. A remote non-authenticated attacker can exploit this vulnerability to execute arbitrary code.
Remediation
Install update from vendor's website.