Service Notices
Warning for the High-Risk Vulnerabilities in Oracle WebLogic
Apr 28, 2019 GMT+08:00
I. Overview
Recently, Oracle released a critical patch update advisory to disclose multiple high-risk WebLogic vulnerabilities, including remote code execution, arbitrary file upload, and deserialization vulnerabilities. Attackers can exploit these vulnerabilities to remotely obtain privileges on WebLogic servers, bringing high security risks.
HUAWEI CLOUD hereby reminds tenants to implement system check and security hardening.
Reference link:
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
II. Severity
Severity: important
(Severity: low, moderate, important, and critical)
III. Vulnerability Description
CVE ID | Affected Component | Severity | Affected Versions |
CVE-2019-2658 | WLS Core Components | Moderate | 10.3.6.0.0, 12.1.3.0.0 |
CVE-2019-2646 | EJB Container | Moderate | 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0 |
CVE-2019-2645 | WLS Core Components | Important | 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0 |
CVE-2018-1258 | WLS Core Components (Spring Framework) | Important | 12.2.1.3.0 |
CVE-2019-2647 | WLS - Web Services | Important | 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0 |
CVE-2019-2648 | WLS - Web Services | Important | 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0 |
CVE-2019-2649 | WLS - Web Services | Important | 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0 |
CVE-2019-2650 | WLS - Web Services | Important | 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0 |
CVE-2019-2618 | WLS Core Components | Low | 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0 |
CVE-2019-2568 | WLS Core Components | Low | 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0 |
CVE-2019-2615 | WLS Core Components | Low | 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0 |
4. Scope of Influence
Affected Products:
Oracle WebLogic Server 10.3.6.0.0
Oracle WebLogic Server 12.1.3.0.0
Oracle WebLogic Server 12.2.1.3.0
Affected Components:
WLS Core Components
WLS Core Components (Spring Framework)
EJB Container
WLS - Web Services
IV: Workarounds
1. Install the latest patch.
2. If the WebLogic components do not depend on the T3 protocol for JVMcommunication, disable the T3 protocol following the procedure below:
a) Log in to the WebLogic console. On the base_domain configuration page, choose the Security tab page, and click Filter.
b) Enter weblogic.security.net.ConnectionFilterImpl in the connection filter.
c) Enter * * 7001 deny t3 t3s in the connection filter rule box.
3. Enable access policy of Web Application Firewall (WAF) to block access from affected URLs.
Note: Before fixing vulnerabilities, back up your files and conduct a thorough test.