ID CVE-2016-0638
Summary Unspecified vulnerability in the Oracle WebLogic Server component in Oracle Fusion Middleware 10.3.6, 12.1.2, 12.1.3, and 12.2.1 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Java Messaging Service.
References
Vulnerable Configurations
  • Oracle Weblogic Server 10.3.6.0.0
    cpe:2.3:a:oracle:weblogic_server:10.3.6.0.0
  • Oracle Weblogic Server 12.1.2.0.0
    cpe:2.3:a:oracle:weblogic_server:12.1.2.0.0
  • Oracle Weblogic Server 12.1.3.0.0
    cpe:2.3:a:oracle:weblogic_server:12.1.3.0.0
  • Oracle Weblogic Server 12.2.1.0.0
    cpe:2.3:a:oracle:weblogic_server:12.2.1.0.0
CVSS
Base: 7.5 (as of 22-04-2016 - 11:32)
Impact:
Exploitability:
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
nessus via4
NASL family Web Servers
NASL id WEBLOGIC_2016_0638.NASL
description The remote Oracle WebLogic Server is affected by a remote code execution vulnerability in the Java Messaging Service subcomponent in the readExternal() function due to improper sanitization of user-supplied input. An unauthenticated, remote attacker can exploit this, via a crafted object payload, to bypass the ClassFilter.class blacklist and execute arbitrary Java code in the context of the WebLogic server.
last seen 2019-01-16
modified 2018-11-15
plugin id 90709
published 2016-04-26
reporter Tenable
source https://www.tenable.com/plugins/index.php?view=single&id=90709
title Oracle WebLogic Server Java Object Deserialization RCE (April 2016 CPU)
refmap via4
confirm http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
misc https://www.tenable.com/security/research/tra-2016-09
sectrack 1035615
Last major update 02-12-2016 - 22:16
Published 21-04-2016 - 06:59
Last modified 30-10-2018 - 12:27
Back to Top