Oracle WebLogic Server Node Manager Remote Command Execution

high Nessus Plugin ID 44316

Synopsis

The remote service allows execution of arbitrary code.

Description

The version of Node Manager listening on this port allows unauthenticated, remote attackers to execute arbitrary commands with system privileges.

Solution

Apply the fix referenced in Oracle's advisory.

See Also

http://www.nessus.org/u?6aee3333

http://www.nessus.org/u?a7d02724

Plugin Details

Severity: High

ID: 44316

File Name: weblogic_nodemanager_cmd_exec.nasl

Version: 1.18

Type: remote

Family: Misc.

Published: 1/26/2010

Updated: 8/6/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 7.7

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

Exploit Ease: No known exploits are available

Exploited by Nessus: true

Vulnerability Publication Date: 1/23/2010

Reference Information

CVE: CVE-2010-0073

BID: 37926