-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
                         AUSCERT Security Bulletin

                              ASB-2019.0130.2
           [0-day] Oracle WebLogic deserialization vulnerability
                               27 April 2019

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              Oracle Fusion Middleware
Operating System:     Windows
                      UNIX variants (UNIX, Linux, OSX)
Impact/Access:        Execute Arbitrary Code/Commands -- Remote/Unauthenticated
Resolution:           Patch/Upgrade
CVE Names:            CVE-2019-2725  
Member content until: Sunday, May 26 2019
Reference:            ASB-2018.0083

Comment: UPADATE 2019-04-27 Vendor advises to patch as soon as possible. 
                            The vulnerability is now called CVE-2019-2725. 
         ORIGINAL-ASB. This is a 0-Day, at the time of writing, with no official 
                       patch nor mitigation steps available against the newly 
                       released PoC that has been made public.

Revision History:     April 27 2019: Oracle has released an out-of-band patch 
                                     to address the vulnerability now named 
                                     CVE-2019-2725.
                      April 26 2019: Initial Release

OVERVIEW

        UPADATE 2019-04-27
        A deserialization vulnerability has been found affecting:
          o Oracle WebLogic Server, versions 10.3.6.0.0, 12.1.3.0.0 [6]
        
        ORIGINAL-ASB
        A deserialization vulnerability affecting all versions of Oracle 
        WebLogic, with PoC used against version 10.3. [1][2]


IMPACT

        UPADATE 2019-04-27
        The vendor has provided the following information regarding the
        vulnerability:
        
        "CVE-2019-2725
         9.8 AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 
        Easily exploitable vulnerability allows unauthenticated attacker 
        with network access via HTTP to compromise Oracle WebLogic Server. 
        Successful attacks of this vulnerability can result in takeover of 
        Oracle WebLogic Server.
         Affects:
          o  Oracle WebLogic Server 10.3.6.0.0, 12.1.3.0.
        " [7]
        
        ORIGINAL-ASB
        CVD-2018-07811 [2]
        CVE-2018-2628 [3]
        
        "An attacker could exploit this vulnerability to remotely execute 
        commands without authorization." [1]


MITIGATION

        UPDATE 2019-04-27
        The vendor has issued a patch addressing stating:
        "Due to the severity of this vulnerability, Oracle strongly recommends 
        that customers apply the updates provided by this Security Alert as 
        soon as possible."
        [6]
        
        ORIGINAL-ASB
        "Scenario-1: Find and delete wls9_async_response.war, wls-wsat.war 
        and restart the Weblogic service
        
        Scenario-2: Controls URL access for the /_async/* and /wls-wsat/* 
        paths by access policy control." [1]
        
        A snort rule exists for CVE-2018-2628 but effectiveness unconfirmed
        against the newly released PoC.[4]
        
        Oracle released a patch for CVE-2018-2628 in April 2018 but reported
        ineffective to newly released PoC. [5][3]


REFERENCES

        [1] [KnownSec 404 Team] Oracle WebLogic Deserialization RCE
            Vulnerability (0day) Alert
            https://medium.com/@knownseczoomeye/knownsec-404-team-oracle-weblogic-deserialization-rce-vulnerability-0day-alert-90dd9a79ae93

        [2] April 17 CNVD releases vulnerability announcement
            http://www.cnvd.org.cn/webinfo/show/4989

        [3] Unpatched Vulnerability Alert - WebLogic Zero Day
            https://isc.sans.edu/forums/diary/Unpatched+Vulnerability+Alert+WebLogic+Zero+Day/24880/

        [4] Sid 1-46446 - Oracle Weblogic unsafe deserialization remote code
            execution attempt detected
            https://www.snort.org/rule_docs/1-46446

        [5] Oracle Critical Patch Update Advisory - April 2018
            https://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html

        [6] Oracle Security Alert Advisory - CVE-2019-2725
            https://www.oracle.com/technetwork/security-advisory/alert-cve-2019-2725-5466295.html

        [7] Text Form of Oracle Security Alert - CVE-2019-2725 Risk Matrices
            https://www.oracle.com/technetwork/security-advisory/alert-cve-2019-2725-verbose-5466296.html

AusCERT has made every effort to ensure that the information contained
in this document is accurate.  However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours 
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=24iJ
-----END PGP SIGNATURE-----