Oracle Weblogic (formerly BEA Weblogic) contains a vulnerability which can allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.
Oracle Weblogic Server and Weblogic Express applicaiton servers can be integrated with the Apache webserver using the Weblogic Apache connector plugin (mod_wl). A buffer overflow exists in Weblogic Server and Weblogic Express due to the way that the Apache connector plugin handles specially crafted POST requests. According to Oracle Security Advisory for CVE-2008-3257:
The following versions of WebLogic Server and WebLogic Express are affected by this vulnerability
Apache Plug-ins dated prior to July 28 2008 which implies:
A remote, unauthenticated attacker may be able to execute arbitrary code.
Apply a patchPatches have been released to address this issue. Refer to Oracle Security Advisory for CVE-2008-3257 for more information.
Install the mod_security module
Oracle suggests installing the mod_security module, which is available in open source from http://www.modsecurity.org/.
More information about these workarounds is provided in Oracle Security Advisory for CVE-2008-3257.
This vulnerabilty was reported by KingCope.
This document was written by Chris Taschner.
|Date First Published:||2008-07-29|
|Date Last Updated:||2008-08-06 16:48 UTC|