Vulnerability has already been discovered by hackers and used for attacking. That's why the company emphasized that the update should be done very quickly in order to protect its customers.
Oracle has provided some clue on vulnerability CVE-2019-2729. Hackers can exploit the vulnerability for to perform code, remotely, without having to verify their identity. They can, for example, carry out attack, without having to enter a username and password.
This is not the first time that WebLogic Servers Oracle addresses this specific security issue. In April, Oracle had released a patch for a similar vulnerability (CVE-2019-2725), which was also used by hackers to spread ransomware and cryptominers.
KnownSec 404 advised users to do some things to reduce the risk before Oracle released the update.
The advice given by company, are the folowing:
- Find and delete wls9_async_response.war, wls-wsat.war, and restart Weblogic or
- Prevent access to / _async / * and / wls-wsat / * URL paths. This advice is valid now, for those who can not directly apply the new update.
Η vulnerability CVE-2019-2729, unlike CVE-2019-2725, does not affect all WebLogic versions, but only: 10.3.6.0.0, 126.96.36.199.0 and 188.8.131.52.0.
Oracle WebLogic is a Java EE application server, part of Oracle's Fusion Middleware and supports many popular databases. That's why it's a favorite target of hackers. It is also a choice of many organizations, therefore hackers they are targeted to gain access to many data.
How useful was this post?
Average rating / 5. Vote count: