Oracle WebLogic Apache Connector Lets Remote Users Execute Arbitrary Code
|
SecurityTracker Alert ID: 1020520 |
SecurityTracker URL: http://securitytracker.com/id/1020520
|
CVE Reference:
CVE-2008-3257
(Links to External Site)
|
Updated: Jul 30 2008
|
Original Entry Date: Jul 18 2008
|
Impact:
Execution of arbitrary code via network, User access via network
|
Vendor Confirmed: Yes Exploit Included: Yes
|
Version(s): 6.1 SP7, 7.0 SP7, 8.1 SP6, 9.0, 9.1, 9.2 MP3, 10.0 MP1 and prior service packs
|
Description:
A vulnerability was reported in Oracle WebLogic in the Apache Connector. A remote user can execute arbitrary code on the target system.
A remote user can send a specially crafted HTTP POST request to execute arbitrary code on the target system. The code will run with the privileges of the target service.
The vulnerability resides in mod_weblogic.
A demonstration exploit is available at:
http://www.milw0rm.com/exploits/6089
KingCope reported this vulnerability.
|
Impact:
A remote user can execute arbitrary code on the target system.
|
Solution:
The vendor has described a workaround at:
https://support.bea.com/application_content/product_portlets/securityadvisories/2793.html
The vendor's advisories are available at:
http://www.oracle.com/technology/deploy/security/alerts/alert_cve2008-3257.html
https://support.bea.com/application_content/product_portlets/securityadvisories/2793.html
|
Vendor URL: www.oracle.com/technology/deploy/security/alerts/alert_cve2008-3257.html (Links to External Site)
|
Cause:
Boundary error
|
Underlying OS: Linux (Red Hat Enterprise), Linux (SuSE), UNIX (AIX), UNIX (HP/UX), UNIX (Solaris - SunOS), Windows (NT), Windows (2000), Windows (2003)
|
Underlying OS Comments: Tested on Windows 20003
|
|
Message History:
None.
|
Source Message Contents
|
|
[Original Message Not Available for Viewing]
|
|