Oracle.WebLogic.Server.LinkRef.JNDI.Injection

description-logoDescription

This indicates an attack attempt to exploit a JNDI Injection Vulnerability in Oracle WebLogic Server.
This vulnerability is due to improper handling of user input when using the server naming service to bind a LinkRef object. A remote, unauthenticated attacker can exploit this vulnerability by sending a crafted request to a vulnerable server. Successful exploitation results in the target server performing a JNDI lookup to an attacker controlled server, and in the worst case execution of arbitrary code under the security context of the affected server.

affected-products-logoAffected Products

Oracle WebLogic Server 12.2.1.3.0
Oracle WebLogic Server 12.2.1.4.0
Oracle WebLogic Server 14.1.1.0.0

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.

recomended-action-logoRecommended Actions

Apply the most recent upgrade or patch from the vendor.
https://www.oracle.com/security-alerts/cpuapr2023.html

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Detail
2023-08-01 25.612 Sig Added
2023-06-26 24.589 Default_action:pass:drop
2023-06-15 24.578