Lucene search

K
attackerkbAttackerKBAKB:255908B4-BA2B-4575-84E5-63690A0110AE
HistoryApr 15, 2020 - 12:00 a.m.

CVE-2020-2883

2020-04-1500:00:00
attackerkb.com
48

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via IIOP, T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

Recent assessments:

hrbrmstr at May 02, 2020 12:18am UTC reported:

Well, itā€™s bad when even Oracle decides to raise the alarm bells (wayback machine was down, so no permalink yet) about it.

Theyā€™ve detected active exploitation attempts against WebLogic servers.

T3 is Weblogicā€™s proprietary implementation of the RMI spec and is primarily used as a layer to enable JNDI calls by apps/clients.

It appears thereā€™s PoC for it but I havenā€™t tested it yet. Since itā€™s yet-another deserialization vulnerability and thereā€™s existing PoC code for similar RMI RCE, Oracleā€™s observations are likely correct.

space-r7 at May 15, 2020 7:15pm UTC reported:

Well, itā€™s bad when even Oracle decides to raise the alarm bells (wayback machine was down, so no permalink yet) about it.

Theyā€™ve detected active exploitation attempts against WebLogic servers.

T3 is Weblogicā€™s proprietary implementation of the RMI spec and is primarily used as a layer to enable JNDI calls by apps/clients.

It appears thereā€™s PoC for it but I havenā€™t tested it yet. Since itā€™s yet-another deserialization vulnerability and thereā€™s existing PoC code for similar RMI RCE, Oracleā€™s observations are likely correct.

Assessed Attacker Value: 4
Assessed Attacker Value: 4Assessed Attacker Value: 4

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P