WebLogic Server is a Java application server platform for developing, integrating, deploying, and managing large distributed Web applications and database applications. Recently, Oracle released an update patch to fix the WebLogic Server deserialization vulnerability.
CVE-2018-2893: The vulnerability is caused by deserializing suspicious data in a T3 protocol request. An unauthorized attacker could exploit this vulnerability by sending a request for a specially crafted UnicastRef object to a vulnerable service. If the vulnerability is exploited successfully, the JRMP session output between the target server and the controlled server will allow the attacker to respond with malicious serialized objects that are not matched by the blacklist, causing Oracle WebLogic Server to be taken over.
Vulnerability Source: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2893
- Oracle WebLogic Server 10.3.6.0
- Oracle WebLogic Server 184.108.40.206
- Oracle WebLogic Server 220.127.116.11
- Oracle WebLogic Server 18.104.22.168
Update the bug fix release provided by Oracle to eliminate the damage caused by the vulnerability.
Prevent WebLogic Server from communicating with suspicious network through port 7001.
Official statement: http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
[Hillstone Networks Solution]
Hillstone Networks has added signatures to the IPS signature database version 2.1.249. By deploying any Hillstone Networks solution with the IPS function, the Oracle WebLogic Server Activator Insecure Deserialization vulnerability can be quickly detected and effectively intercepted, preventing the server from being attacked.
Threat Events Detected by Hillstone Solutions
Vulnerability Detail Description