Lucene search

K
saintSAINT CorporationSAINT:880C926D2511DE57F08789A66AFE11F2
HistoryMay 27, 2020 - 12:00 a.m.

Oracle WebLogic Server BadAttributeValueExpException deserialization

2020-05-2700:00:00
SAINT Corporation
my.saintcorporation.com
161

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.96 High

EPSS

Percentile

99.4%

Added: 05/27/2020
CVE: CVE-2020-2555

Background

Oracle WebLogic Server (formerly BEA WebLogic Server) is a Java web application platform.

Problem

A Java object deserialization vulnerability in WebLogic allows unauthenticated remote code execution by sending a serialized **BadAttributeValueExpException** object over the T3 protocol.

Resolution

Apply the patch referenced in Oracle Critical Patch Update Advisory - January 2020.

References

<https://www.oracle.com/security-alerts/cpujan2020.html&gt;

Limitations

Exploit works on Oracle WebLogic Server 12.1.3.0.0, 12.2.1.3.0, and 12.2.1.4.0 on Windows.

Platforms

Windows

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.96 High

EPSS

Percentile

99.4%