Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT Security Bulletin ASB-2019.0130.2 [0-day] Oracle WebLogic deserialization vulnerability 27 April 2019 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Oracle Fusion Middleware Operating System: Windows UNIX variants (UNIX, Linux, OSX) Impact/Access: Execute Arbitrary Code/Commands -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2019-2725 Member content until: Sunday, May 26 2019 Reference: ASB-2018.0083 Comment: UPADATE 2019-04-27 Vendor advises to patch as soon as possible. The vulnerability is now called CVE-2019-2725. ORIGINAL-ASB. This is a 0-Day, at the time of writing, with no official patch nor mitigation steps available against the newly released PoC that has been made public. Revision History: April 27 2019: Oracle has released an out-of-band patch to address the vulnerability now named CVE-2019-2725. April 26 2019: Initial Release OVERVIEW UPADATE 2019-04-27 A deserialization vulnerability has been found affecting: o Oracle WebLogic Server, versions 10.3.6.0.0, 12.1.3.0.0 [6] ORIGINAL-ASB A deserialization vulnerability affecting all versions of Oracle WebLogic, with PoC used against version 10.3. [1][2] IMPACT UPADATE 2019-04-27 The vendor has provided the following information regarding the vulnerability: "CVE-2019-2725 9.8 AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. Affects: o Oracle WebLogic Server 10.3.6.0.0, 12.1.3.0. " [7] ORIGINAL-ASB CVD-2018-07811 [2] CVE-2018-2628 [3] "An attacker could exploit this vulnerability to remotely execute commands without authorization." [1] MITIGATION UPDATE 2019-04-27 The vendor has issued a patch addressing stating: "Due to the severity of this vulnerability, Oracle strongly recommends that customers apply the updates provided by this Security Alert as soon as possible." [6] ORIGINAL-ASB "Scenario-1: Find and delete wls9_async_response.war, wls-wsat.war and restart the Weblogic service Scenario-2: Controls URL access for the /_async/* and /wls-wsat/* paths by access policy control." [1] A snort rule exists for CVE-2018-2628 but effectiveness unconfirmed against the newly released PoC.[4] Oracle released a patch for CVE-2018-2628 in April 2018 but reported ineffective to newly released PoC. [5][3] REFERENCES [1] [KnownSec 404 Team] Oracle WebLogic Deserialization RCE Vulnerability (0day) Alert https://medium.com/@knownseczoomeye/knownsec-404-team-oracle-weblogic-deserialization-rce-vulnerability-0day-alert-90dd9a79ae93 [2] April 17 CNVD releases vulnerability announcement http://www.cnvd.org.cn/webinfo/show/4989 [3] Unpatched Vulnerability Alert - WebLogic Zero Day https://isc.sans.edu/forums/diary/Unpatched+Vulnerability+Alert+WebLogic+Zero+Day/24880/ [4] Sid 1-46446 - Oracle Weblogic unsafe deserialization remote code execution attempt detected https://www.snort.org/rule_docs/1-46446 [5] Oracle Critical Patch Update Advisory - April 2018 https://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html [6] Oracle Security Alert Advisory - CVE-2019-2725 https://www.oracle.com/technetwork/security-advisory/alert-cve-2019-2725-5466295.html [7] Text Form of Oracle Security Alert - CVE-2019-2725 Risk Matrices https://www.oracle.com/technetwork/security-advisory/alert-cve-2019-2725-verbose-5466296.html AusCERT has made every effort to ensure that the information contained in this document is accurate. However, the decision to use the information described is the responsibility of each user or organisation. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBXMOxp2aOgq3Tt24GAQhLag/8DrHEayFIjMbd7nR9mTUtkOh5MO77tHsK 4/xAsGJ1KELYYNyCqmX6DW3JgiKYqEONW3JUv24/cBydWFjU/ODtI6A3eaUOyKrY jWmW1B1iZMqOYj8MeAfCqOAE7qY4dt1uqWJkS4ytd4HjIURFK3gQkWFM+tXnvQbS OPZ1RYgN9WaoB9dKdtEBVdTNO9cLOTFQ3UFbGZgOG1sN9TtdZnJ7R19BhECn+tKU 6Jui/beE4QScD6fLY4EqCn4gZQI8VPj5GWkSUzYp4cWh5mFelIPsy8gPx2gpiy2N nzHqE+ZgQX7hMXl0YRZIrV3V8E07RZb2wLg0SyOtAb7Wds/PFzRMorjvK7QB1fzG YIgWWwt/Ts0wnH2ZJBlXtgQHYaeKN5zeNzZaiUIf89Ak/djQNuyE8gPmr6ceXei8 SvlgQDwMA3X/03IrGr5awoWoPHiwYjOpfQHVz5XRBdh/CYidkoCCFqWEhRnL/3fR we3GvkrE6GUcPPtPsZqB5X3fpgI4tRtbzB1nGggjt+kNhxkk7B1ms8XH/Q8x4u9C 5d5RrzkNKi59b1ej8pKiOivlAvw5v3YS/ZH5n9SamSgFZasm4OCXq4L4DjHPZoNP iBCs52d43ojNrAYg+CZNgnLjXiLyg88vWyzeHZjwxutfIdSXj0gTcP564ul0F1sQ AByAz+y595c= =24iJ -----END PGP SIGNATURE-----