-----BEGIN PGP SIGNED MESSAGE-----
AUSCERT Security Bulletin
[0-day] Oracle WebLogic deserialization vulnerability
27 April 2019
AusCERT Security Bulletin Summary
Product: Oracle Fusion Middleware
Operating System: Windows
UNIX variants (UNIX, Linux, OSX)
Impact/Access: Execute Arbitrary Code/Commands -- Remote/Unauthenticated
CVE Names: CVE-2019-2725
Member content until: Sunday, May 26 2019
Comment: UPADATE 2019-04-27 Vendor advises to patch as soon as possible.
The vulnerability is now called CVE-2019-2725.
ORIGINAL-ASB. This is a 0-Day, at the time of writing, with no official
patch nor mitigation steps available against the newly
released PoC that has been made public.
Revision History: April 27 2019: Oracle has released an out-of-band patch
to address the vulnerability now named
April 26 2019: Initial Release
A deserialization vulnerability has been found affecting:
o Oracle WebLogic Server, versions 10.3.6.0.0, 188.8.131.52.0 
A deserialization vulnerability affecting all versions of Oracle
WebLogic, with PoC used against version 10.3. 
The vendor has provided the following information regarding the
Easily exploitable vulnerability allows unauthenticated attacker
with network access via HTTP to compromise Oracle WebLogic Server.
Successful attacks of this vulnerability can result in takeover of
Oracle WebLogic Server.
o Oracle WebLogic Server 10.3.6.0.0, 184.108.40.206.
"An attacker could exploit this vulnerability to remotely execute
commands without authorization." 
The vendor has issued a patch addressing stating:
"Due to the severity of this vulnerability, Oracle strongly recommends
that customers apply the updates provided by this Security Alert as
soon as possible."
"Scenario-1: Find and delete wls9_async_response.war, wls-wsat.war
and restart the Weblogic service
Scenario-2: Controls URL access for the /_async/* and /wls-wsat/*
paths by access policy control." 
A snort rule exists for CVE-2018-2628 but effectiveness unconfirmed
against the newly released PoC.
Oracle released a patch for CVE-2018-2628 in April 2018 but reported
ineffective to newly released PoC. 
 [KnownSec 404 Team] Oracle WebLogic Deserialization RCE
Vulnerability (0day) Alert
 April 17 CNVD releases vulnerability announcement
 Unpatched Vulnerability Alert - WebLogic Zero Day
 Sid 1-46446 - Oracle Weblogic unsafe deserialization remote code
execution attempt detected
 Oracle Critical Patch Update Advisory - April 2018
 Oracle Security Alert Advisory - CVE-2019-2725
 Text Form of Oracle Security Alert - CVE-2019-2725 Risk Matrices
AusCERT has made every effort to ensure that the information contained
in this document is accurate. However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.
Australian Computer Emergency Response Team
The University of Queensland
Internet Email: email@example.com
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
-----BEGIN PGP SIGNATURE-----
-----END PGP SIGNATURE-----