Overview
Oracle Weblogic (formerly BEA Weblogic) contains a vulnerability which can allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.
Description
Oracle Weblogic Server and Weblogic Express applicaiton servers can be integrated with the Apache webserver using the Weblogic Apache connector plugin (mod_wl). A buffer overflow exists in Weblogic Server and Weblogic Express due to the way that the Apache connector plugin handles specially crafted POST requests. According to Oracle Security Advisory for CVE-2008-3257:
The following versions of WebLogic Server and WebLogic Express are affected by this vulnerability Apache Plug-ins dated prior to July 28 2008 which implies: |
Impact
A remote, unauthenticated attacker may be able to execute arbitrary code. |
Solution
Apply a patchPatches have been released to address this issue. Refer to Oracle Security Advisory for CVE-2008-3257 for more information. |
Reconfigure Apache
LimitRequestLine 4000 Install the mod_security module Oracle suggests installing the mod_security module, which is available in open source from http://www.modsecurity.org/. More information about these workarounds is provided in Oracle Security Advisory for CVE-2008-3257. |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
Acknowledgements
This vulnerabilty was reported by KingCope.
This document was written by Chris Taschner.
Other Information
CVE IDs: | CVE-2008-3257 |
Severity Metric: | 17.33 |
Date Public: | 2008-07-21 |
Date First Published: | 2008-07-29 |
Date Last Updated: | 2008-08-06 16:48 UTC |
Document Revision: | 8 |