Oracle WebLogic Server Deserialization RCE (CVE-2018-2628)

Critical Nessus Plugin ID 109429

Synopsis

The remote Oracle WebLogic server is affected by a remote code execution vulnerability.

Description

The remote Oracle WebLogic server is affected by a remote code execution vulnerability in the Core Components subcomponent due to unsafe deserialization of Java objects by the RMI registry. An unauthenticated, remote attacker can exploit this, via a crafted Java object, to execute arbitrary Java code in the context of the WebLogic server.

Note that this plugin does not attempt to exploit this RCE directly and instead checks for the presence of the patch Oracle supplied in the April 2018 critical patch update (CPU).

Solution

Apply the appropriate patch according to the April 2018 Oracle Critical Patch Update advisory.

Note that the patch for CVE-2018-2628 is reportedly incomplete.
Refer to Oracle for any additional patch instructions or mitigation options.

See Also

http://www.nessus.org/u?4e39ef65

https://github.com/brianwrf/CVE-2018-2628

https://github.com/shengqi158/CVE-2018-2628

http://www.nessus.org/u?9cf2dde7

Plugin Details

Severity: Critical

ID: 109429

File Name: weblogic_cve_2018_2628.nasl

Version: 1.8

Type: remote

Family: Web Servers

Published: 2018/04/30

Updated: 2019/04/05

Dependencies: 109552, 56979

Risk Information

Risk Factor: Critical

CVSS v2.0

Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

CVSS v3.0

Base Score: 10

Temporal Score: 9.2

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:oracle:fusion_middleware, cpe:/a:oracle:weblogic_server

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2018/04/17

Vulnerability Publication Date: 2018/04/17

Exploitable With

Metasploit (Oracle Weblogic Server Deserialization RCE)

Reference Information

CVE: CVE-2018-2628

BID: 103776