Oracle WebLogic Server Node Manager Remote Command Execution

Critical Nessus Plugin ID 44316


The remote service allows execution of arbitrary code.


The version of Node Manager listening on this port allows unauthenticated, remote attackers to execute arbitrary commands with system privileges.


Apply the fix referenced in Oracle's advisory.

See Also

Plugin Details

Severity: Critical

ID: 44316

File Name: weblogic_nodemanager_cmd_exec.nasl

Version: $Revision: 1.15 $

Type: remote

Family: Misc.

Published: 2010/01/26

Modified: 2017/12/14

Dependencies: 11936, 44315

Risk Information

Risk Factor: Critical


Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

Vulnerability Information

Exploit Available: true

Exploit Ease: Exploits are available

Exploited by Nessus: true

Vulnerability Publication Date: 2010/01/23

Reference Information

CVE: CVE-2010-0073

BID: 37926

OSVDB: 62033