Oracle WebLogic Server Deserialization RCE (CVE-2018-2628)

Critical Nessus Plugin ID 109429


The remote Oracle WebLogic server is affected by a remote code
execution vulnerability.


The remote Oracle WebLogic server is affected by a remote code
execution vulnerability in the Core Components subcomponent due to
unsafe deserialization of Java objects by the RMI registry. An
unauthenticated, remote attacker can exploit this, via a crafted Java
object, to execute arbitrary Java code in the context of the WebLogic

Note that this plugin does not attempt to exploit this RCE directly
and instead checks for the presence of the patch Oracle supplied
in the April 2018 critical patch update (CPU).


Apply the appropriate patch according to the April 2018 Oracle
Critical Patch Update advisory.

Note that the patch for CVE-2018-2628 is reportedly incomplete.
Refer to Oracle for any additional patch instructions or
mitigation options.

See Also

Plugin Details

Severity: Critical

ID: 109429

File Name: weblogic_cve_2018_2628.nasl

Version: 1.7

Type: remote

Family: Web Servers

Published: 2018/04/30

Modified: 2018/11/15

Dependencies: 109552, 56979

Risk Information

Risk Factor: Critical

CVSS v2.0

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS v3.0

Base Score: 10

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Vulnerability Information

CPE: cpe:/a:oracle:fusion_middleware, cpe:/a:oracle:weblogic_server

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2018/04/17

Vulnerability Publication Date: 2018/04/17

Exploitable With

Metasploit (Oracle Weblogic Server Deserialization RCE)

Reference Information

CVE: CVE-2018-2628

BID: 103776