ORACLE WEBLOGIC, NEW CRITICAL FLAW DISCOVERED CVE-2019-2729

 In Threat Horizon

Priority: Critical

Executive Summary: A new critical vulnerability has been discovered that affects several versions of the Oracle WebLogic server. The bug has classed as critical-level security risk and has a CVSS Base Score of 9.8. The vulnerability has already been exploited in the wild by several unknown hacker groups.

This security update highlights a deserialization vulnerability in the XMLDecoder within the Oracle WebLogic server. This new exploitation technique allows attackers to remotely run arbitrary commands on the affected servers by simply sending a specially crafted HTTP request. This remote code execution (RCE) flaw does not require any form of authentication/remote access credentials in order to be leveraged.

The new critical flaw is related to the previous 0-day vulnerability (CVE-2019-2725) discovered in April 2019 which has been patched. This previous vulnerability has been exploited in several attack variations such as; “Sodinokibi” and “GraandCrab ransomware as well as the “XMRIG” cryptocurrency mining malware attacks. Both critical vulnerabilities rely on the deserialization process in XMLDecoder.

Detect: Any Oracle WebLogic servers which have not already been updated will be affected by this vulnerability. ITC customers who are subscribed to the ITC VI service can request a scan to identify affected operating.

Affected Products: Oracle WebLogic Server, versions; 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0

Prevent: Due to the severity of this vulnerability, ITC strongly recommends that customers apply the updates provided by the Oracle Security Alert Advisory – CVE-2019-2729.

React: Oracle have released an emergency software update and patches for CVE-2019-2729. It is advised that these updates are applied and installed as soon as possible. If patching is not currently possible, the temporary mitigations for CVE-2019-2725 are applicable:

  • Delete the wls9_async_response.war, wls-wsat.war packages from the WebLogic server, and restart the Weblogic service
  • Restrict or disable access to the “/_async/*” and “/wls-wsat/” URL paths on the WebLogic server

Sources:
https://www.oracle.com/technetwork/security-advisory/alert-cve-2019-2729-5570780.html#AppendixFMW
https://www.oracle.com/technetwork/topics/security/alerts-086861.html

Oracle Patched Another Zero-Day Vulnerability that Can be Exploited Without Authentication


https://thehackernews.com/2019/06/oracle-weblogic-vulnerability.html
https://medium.com/@knownsec404team/knownsec-404-team-alert-again-cve-2019-2725-patch-bypassed-32a6a7b7ca15

Author: Archie Jobson

Recent Posts

Leave a Comment

Tel:
+44 (0) 20 7517 3900