Oracle.WebLogic.Server.LinkRef.JNDI.Injection
Description
This indicates an attack attempt to exploit a JNDI Injection Vulnerability in Oracle WebLogic Server.
This vulnerability is due to improper handling of user input when using the server naming service to bind a LinkRef object. A remote, unauthenticated attacker can exploit this vulnerability by sending a crafted request to a vulnerable server. Successful exploitation results in the target server performing a JNDI lookup to an attacker controlled server, and in the worst case execution of arbitrary code under the security context of the affected server.
Affected Products
Oracle WebLogic Server 12.2.1.3.0
Oracle WebLogic Server 12.2.1.4.0
Oracle WebLogic Server 14.1.1.0.0
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Apply the most recent upgrade or patch from the vendor.
https://www.oracle.com/security-alerts/cpuapr2023.html
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |
Version Updates
Date | Version | Detail |
---|---|---|
2023-08-01 | 25.612 | Sig Added |
2023-06-26 | 24.589 | Default_action:pass:drop |
2023-06-15 | 24.578 |