Lucene search

K
hackeroneLinkksH1:300513
HistoryDec 25, 2017 - 9:57 p.m.

U.S. Dept Of Defense: WebLogic Server Side Request Forgery

2017-12-2521:57:03
linkks
hackerone.com
58

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.97 High

EPSS

Percentile

99.6%

Universal Description Discovery and Integration (UDDI) application is publicly available on this WebLogic server. The SearchPublicRegistries.jsp page can be abused by unauthenticated attackers to cause the WebLogic web server to connect to an arbitrary TCP port of an arbitrary host. Responses returned are fairly verbose and can be used to infer whether a service is listening on the port specified. This vulnerability affects Oracle Fusion Middleware 10.0.2, 10.3.6.

The impact of this vulnerability
An attacker can force the WebLogic web server to connect to an arbitrary TCP port of an arbitrary host.

How to fix this vulnerability
Apply the Oracle Critical Patch Update Advisory from July 2014 or restrict access to the UDDI application.

https://blog.gdssecurity.com/labs/2015/3/30/weblogic-ssrf-and-xss-cve-2014-4241-cve-2014-4210-cve-2014-4.html

Impact

https://β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆ/uddiexplorer/SearchPublicRegistries.jsp?operator=http://127.0.0.1:80&rdoSearch=name&txtSearchname=sdf&txtSearchkey=&txtSearchfor=&selfor=Business+location&btnSubmit=Search

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.97 High

EPSS

Percentile

99.6%