On Tuesday, Oracle released emergency patches for another critical remote code execution vulnerability affecting the WebLogic Server.
The vulnerability, tracked as CVE-2019-2729, affects WebLogic versions 10.3.6.0.0, 184.108.40.206.0 and 220.127.116.11.0. The vulnerability is a remotely exploitable deserialization vulnerability via XMLDecoder in Oracle WebLogic Server Web Services, it received a CVSS score of 9.8.
A remote attacker could exploit the CVE-2019-2729 flaw without authentication. The issue was independently reported to Oracle by many security researchers.
“This Security Alert addresses CVE-2019-2729, a
“Due to the severity of this vulnerability, Oracle strongly recommends that customers apply the updates provided by this Security Alert as soon as possible.”
Oracle urges its users to apply the necessary patches and also the latest Critical Patch Update (CPU).
John Heimann, VP of Security Program Management at Oracle, pointed out that the CVE-2019-2729 is different from the recently discovered CVE-2019-2725 that was exploited in cryptojacking campaigns and in hacking campaigns spreading the Sodinokibi ransomware.
“Due to the severity of this vulnerability, Oracle recommends that this Security Alert be applied as soon as possible.”
According to the experts at Knownsec 404 Team who also reported the flaw, the CVE-2019-2729 is actually the result of an uncomplete patch for CVE-2019-2725. Knownsec 404 Team confirmed that threat actors are already exploiting the CVE-2019-2729 in the wild.
“Then today, a new
Knownsec 404 Team provided the following temporary solutions:
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.