Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Security Oracle Privacy

Oracle Issues Emergency Update To Patch Actively Exploited WebLogic Flaw (arstechnica.com) 26

An anonymous reader quotes a report from Ars Technica: Oracle on Tuesday published an out-of-band update patching a critical code-execution vulnerability in its WebLogic server after researchers warned that the flaw was being actively exploited in the wild. The vulnerability, tracked as CVE-2019-2729, allows an attacker to run malicious code on the WebLogic server without any need for authentication. That capability earned the vulnerability a Common Vulnerability Scoring System score of 9.8 out of 10. The vulnerability is a deserialization attack targeting two Web applications that WebLogic appears to expose to the Internet by default -- wls9_async_response and wls-wsat.war. The flaw in Oracle's WebLogic Java application servers came to light as a zero-day four days ago when it was reported by security firm KnownSec404.
This discussion has been archived. No new comments can be posted.

Oracle Issues Emergency Update To Patch Actively Exploited WebLogic Flaw

Comments Filter:

"What man has done, man can aspire to do." -- Jerry Pournelle, about space flight

Working...