The Oracle WebLogic Server Plug-in Remote Overflow is a buffer overflow vulnerability that affects the version of the plug-in used to proxy requests from an HTTP server to WebLogic. An unauthenticated attacker can execute arbitrary code on the remote host
Reporter | Title | Published | Views | Family All 19 |
---|---|---|---|---|
![]() | Oracle WebLogic IIS connector JSESSIONID - Remote Overflow | 1 Apr 200900:00 | – | exploitdb |
![]() | BEA WebLogic - JSESSIONID Cookie Value Overflow (Metasploit) | 3 Jul 201000:00 | – | exploitdb |
![]() | BEA WebLogic JSESSIONID Cookie Value Overflow | 27 Mar 200919:03 | – | metasploit |
![]() | Oracle WebLogic Server IIS Connector JSESSIONID buffer overflow | 10 Apr 200900:00 | – | saint |
![]() | Oracle WebLogic Server IIS Connector JSESSIONID buffer overflow | 10 Apr 200900:00 | – | saint |
![]() | Oracle WebLogic Server IIS Connector JSESSIONID buffer overflow | 10 Apr 200900:00 | – | saint |
![]() | Oracle WebLogic Server IIS Connector JSESSIONID buffer overflow | 10 Apr 200900:00 | – | saint |
![]() | CVE-2008-5457 | 14 Jan 200902:00 | – | cvelist |
![]() | CVE-2008-5457 | 14 Jan 200902:30 | – | nvd |
![]() | CVE-2008-5457 | 14 Jan 200902:30 | – | cve |
Source | Link |
---|---|
securitytracker | www.securitytracker.com/id |
nessus | www.nessus.org/u |
cve | www.cve.mitre.org/cgi-bin/cvename.cgi |
#
# (C) Tenable Network Security, Inc.
#
include("compat.inc");
if (description)
{
script_id(35374);
script_version("1.25");
script_cve_id("CVE-2008-5457");
script_bugtraq_id(33177);
script_xref(name:"Secunia", value:"33526");
script_name(english:"Oracle WebLogic Server Plug-in Remote Overflow (1166189)");
script_summary(english:"Checks the plug-in's build timestamp / change number");
script_set_attribute(attribute:"synopsis", value:
"The remote web server uses a module that is affected by a buffer
overflow vulnerability." );
script_set_attribute(attribute:"description", value:
"The remote web server is using the WebLogic plug-in for Apache, IIS,
or Sun web servers, a module included with Oracle (formerly BEA)
WebLogic Server and used to proxy requests from an HTTP server to
WebLogic.
The version of this plug-in on the remote host is affected by an
as-yet unspecified buffer overflow that is triggered when processing a
specially crafted request. An unauthenticated, remote attacker can
leverage this issue to execute arbitrary code on the remote host.
Note that Nessus has not tried to exploit this issue but rather has
only checked the affected plug-in's change number / build timestamp." );
# http://www.oracle.com/technetwork/topics/security/whatsnew/index.html
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?2b7fdf57" );
script_set_attribute(attribute:"see_also", value:"https://securitytracker.com/id?1021571" );
script_set_attribute(attribute:"solution", value:
"Install the latest web server plug-in as described in the vendor
advisory above." );
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"exploit_framework_core", value:"true");
script_set_attribute(attribute:"d2_elliot_name", value:"Oracle Secure Backup 10.2.0.2 RCE (Windows)");
script_set_attribute(attribute:"exploit_framework_d2_elliot", value:"true");
script_set_attribute(attribute:"metasploit_name", value:'BEA WebLogic JSESSIONID Cookie Value Overflow');
script_set_attribute(attribute:"exploit_framework_metasploit", value:"true");
script_set_attribute(attribute:"plugin_publication_date", value: "2009/01/15");
script_cvs_date("Date: 2018/11/15 20:50:26");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_set_attribute(attribute:"cpe",value:"cpe:/a:oracle:weblogic_server");
script_set_attribute(attribute:"exploited_by_nessus", value:"true");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Web Servers");
script_copyright(english:"This script is Copyright (C) 2009-2018 Tenable Network Security, Inc.");
script_dependencies("http_version.nasl");
script_exclude_keys("Settings/disable_cgi_scanning");
script_require_ports("Services/www", 80);
exit(0);
}
include("global_settings.inc");
include("misc_func.inc");
include("http.inc");
port = get_http_port(default:80);
if (!get_port_state(port)) exit(0);
# Iterate over known directories.
dirs = get_kb_list(string("www/", port, "/content/directories"));
if (isnull(dirs)) dirs = make_list("", "/weblogic");
foreach dir (dirs)
{
# Look for the plug-in and a bridge message.
url = string(dir, "/index.jsp");
res = http_send_recv3(method:"GET", item:url, port:port);
if (res == NULL) exit(0);
# nb: if there's a problem with configured WebLogic server, the initial
# request results in a bridge message we can use to fingerprint the
# plug-in. Otherwise, we pass in a special request to "tickle" one.
if ("X-Powered-By: Servlet" >< res[1])
{
res = http_send_recv3(
method:"POST",
item:url,
port:port,
add_headers:make_array("Content-Length", "-1")
);
if (res == NULL) exit(0);
}
# If it's a bridge message...
if (
# from Apache or...
"TITLE>Weblogic Bridge Message" >< res[2] ||
"Failure of server APACHE bridge:</H2>" >< res[2] ||
# from IIS or...
"Message from the ISAPI plugin:</H2>" >< res[2] ||
# from Sun
"Message from the NSAPI plugin:</H2>" >< res[2]
)
{
build = "";
change = "";
foreach line (split(res[2], keep:FALSE))
{
if ("Build date/time:" >< line)
{
build = strstr(line, "Build date/time:") - "Build date/time:";
build = ereg_replace(pattern:"<[^>]+>", replace:"", string:build);
build = ereg_replace(pattern:"^ +", replace:"", string:build);
}
if ("Change Number:" >< line)
{
change = strstr(line, "Change Number:") - "Change Number:";
change = ereg_replace(pattern:"<[^>]+>", replace:"", string:change);
change = ereg_replace(pattern:"^ +", replace:"", string:change);
}
if (build && change) break;
}
if (
(change && int(change) < 1166189) ||
(
build &&
(
build =~ "^[A-Za-z]{3} ( |[0-3])[0-9] (1[0-9]{3}|200[0-7]) " ||
build =~ "^(Jan|Feb|Mar|Apr|May|Jun|Jul|Aug|Sep|Oct) ( |[0-3])[0-9] 2008 "
)
)
)
{
if (report_verbosity > 0)
{
type = "unknown";
if (
"TITLE>Weblogic Bridge Message" >< res[2] ||
"Failure of server APACHE bridge:</H2>" >< res[2]
) type = "Apache";
else if ("Message from the ISAPI plugin:</H2>" >< res[2]) type = "IIS";
else if ("Message from the NSAPI plugin:</H2>" >< res[2]) type = "Sun";
else type = "unknown";
report = string(
"\n",
"Nessus was able to retrieve the following information about the remote\n",
"WebLogic plug-in :\n",
"\n",
" Plug-in type : ", type, "\n"
);
if (build)
{
report = string(
report,
" Build date/time : ", build, "\n"
);
}
if (change)
{
report = string(
report,
" Change number : ", change, "\n"
);
}
if (report_verbosity > 1)
{
report = string(
report,
"\n",
"It is configured to proxy requests such as :\n",
"\n",
" ", build_url(port:port, qs:url), "\n"
);
}
security_hole(port:port, extra:report);
}
else security_hole(port);
}
# We've found the plug-in so we're done.
exit(0);
}
}
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo