On Tuesday, Oracle released emergency patches for another critical remote code execution vulnerability affecting the WebLogic Server.
The vulnerability, tracked as CVE-2019-2729, affects WebLogic versions 10.3.6.0.0, 22.214.171.124.0 and 126.96.36.199.0. The vulnerability is a remotely exploitable deserialization vulnerability via XMLDecoder in Oracle WebLogic Server Web Services, it received a CVSS score of 9.8.
A remote attacker could exploit the CVE-2019-2729 flaw without authentication. The issue was independently reported to Oracle by many security researchers.
“This Security Alert addresses CVE-2019-2729, a
“Due to the severity of this vulnerability, Oracle strongly recommends that customers apply the updates provided by this Security Alert as soon as possible.”
Oracle urges its users to apply the necessary patches and also the latest Critical Patch Update (CPU).
John Heimann, VP of Security Program Management at Oracle, pointed out that the CVE-2019-2729 is different from the recently discovered CVE-2019-2725 that was exploited in cryptojacking campaigns and in hacking campaigns spreading the Sodinokibi ransomware.
“Please note that while the issue addressed by this alert is a
“Due to the severity of this vulnerability, Oracle recommends that this Security Alert be applied as soon as possible.”
According to the experts at Knownsec 404 Team who also reported the flaw, the CVE-2019-2729 is actually the result of an uncomplete patch for CVE-2019-2725. Knownsec 404 Team confirmed that threat actors are already exploiting the CVE-2019-2729 in the wild.
“Then today, a new
Knownsec 404 Team provided the following temporary solutions:
|[adrotate banner=”9″]||[adrotate banner=”12″]|