Lucene search

K
zdiAlvaro Munoz (pwntester) and Christian Schneider (cschneider4711)ZDI-16-444
HistoryJul 21, 2016 - 12:00 a.m.

Oracle WebLogic PartItem Arbitrary File Upload Remote Code Execution Vulnerability

2016-07-2100:00:00
Alvaro Munoz (pwntester) and Christian Schneider (cschneider4711)
www.zerodayinitiative.com
30

0.015 Low

EPSS

Percentile

87.1%

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Oracle WebLogic. Authentication is not required to exploit this vulnerability. The PartItem class in WebLogic FileUpload allows remote attackers to write to arbitrary files via a NULL byte in a file name in a serialized instance, when used in conjunction with a specific version of Oracle Java. It also allows the attacker to copy any file into a different location. By copying it to the web application root directory, an attacker could leverage this vulnerability to execute arbitrary code under the context of the process.

0.015 Low

EPSS

Percentile

87.1%