Oracle Weblogic Server (MOSC)

MOSC Banner

Oracle WebLogic Server Java Object Deserialization RCE

edited May 5, 2020 5:02AM in Oracle Weblogic Server (MOSC) 1 commentAnswered

The NESSUS scan resulted in vulnerability for WebLogic server (12.2.1.3) and associated managed servers running on the Linux machine. The patch level server for the FMW server is "WLS PATCH SET UPDATE 12.2.1.3.0(ID:191004.0935)". The solution described in the scan documentation is to apply October 2016 CPU. How can I address this issue? How can I apply the previous version of CPU on top of the recent PSU?

Thanks,

mlrrr

Synopsis

The remote Oracle WebLogic server is affected by a remote code execution vulnerability.

Description

The remote Oracle WebLogic server is affected by a remote code execution vulnerability in the WLS Security component due to unsafe deserialize calls of unauthenticated Java objects to the Apache Commons File Upload library. An unauthenticated, remote attacker can exploit this, via a crafted a DiskFileItem object, to execute arbitrary code in the context of the WebLogic server.

Howdy, Stranger!

Log In

To view full details, sign in to My Oracle Support Community.

Register

Don't have a My Oracle Support Community account? Click here to get started.

Category Leaderboard

Top contributors this month

New to My Oracle Support Community? Visit our Welcome Center

MOSC Help Center