Service Notices

All Notices > Security Notices > Warning for the High-Risk Vulnerabilities in Oracle WebLogic

Warning for the High-Risk Vulnerabilities in Oracle WebLogic

Apr 28, 2019 GMT+08:00

I. Overview

Recently, Oracle released a critical patch update advisory to disclose multiple high-risk WebLogic vulnerabilities, including remote code execution, arbitrary file upload, and deserialization vulnerabilities. Attackers can exploit these vulnerabilities to remotely obtain privileges on WebLogic servers, bringing high security risks.

HUAWEI CLOUD hereby reminds tenants to implement system check and security hardening.

Reference link:

https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html

II. Severity

Severity: important

(Severity: low, moderate, important, and critical)

III. Vulnerability Description

CVE ID

Affected Component

Severity

Affected Versions

CVE-2019-2658

WLS Core Components

Moderate

10.3.6.0.0, 12.1.3.0.0

CVE-2019-2646

EJB Container

Moderate

10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0

CVE-2019-2645

WLS Core Components

Important

10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0

CVE-2018-1258

WLS Core Components (Spring Framework)

Important

12.2.1.3.0

CVE-2019-2647

WLS - Web Services

Important

10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0

CVE-2019-2648

WLS - Web Services

Important

10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0

CVE-2019-2649

WLS - Web Services

Important

10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0

CVE-2019-2650

WLS - Web Services

Important

10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0

CVE-2019-2618

WLS Core Components

Low

10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0

CVE-2019-2568

WLS Core Components

Low

10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0

CVE-2019-2615

WLS Core Components

Low

10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0

4. Scope of Influence

Affected Products:

Oracle WebLogic Server 10.3.6.0.0

Oracle WebLogic Server 12.1.3.0.0

Oracle WebLogic Server 12.2.1.3.0

Affected Components:

WLS Core Components

WLS Core Components (Spring Framework)

EJB Container

WLS - Web Services

IV: Workarounds

1. Install the latest patch.

2. If the WebLogic components do not depend on the T3 protocol for JVMcommunication, disable the T3 protocol following the procedure below:

a) Log in to the WebLogic console. On the base_domain configuration page, choose the Security tab page, and click Filter.

b) Enter weblogic.security.net.ConnectionFilterImpl in the connection filter.

c) Enter * * 7001 deny t3 t3s in the connection filter rule box.

3. Enable access policy of Web Application Firewall (WAF) to block access from affected URLs.

Note: Before fixing vulnerabilities, back up your files and conduct a thorough test.