• Categories
    Category
    {{ postCtrl.tags }}
    • {{ category.tag_type }}

      • {{tag.tag_name}}
      • View more
  • Categories
    Category
    {{ postCtrl.tags }}
    • {{ category.tag_type }}

      • {{tag.tag_name}}
      • View more
  • News
  • Tutorials
  • Forums
  • Tags
  • Users
Tutorial News Comments FAQ Related Articles

Oracle Vulnerability Exploited in the Wild

{{postValue.id}}

Recently, Oracle has been forced to push AN emergency patch when the second important vulnerability in Oracle WebLogic Server was known in but eight weeks. The Oracle vulnerability – rated a drop-everything-and-patch-it-now nine.8 on the CVSS risk matrix – is remotely exploitable while not authentication, i.e., could (and has been) exploited over a network while not the requirement for a username and word.

Oracle WebLogic Server is AN application server for building and deploying enterprise Java engineering science applications: over forty,000 web-accessible instances area unit in danger. Oracle’s security alert for the vulnerability, CVE-2019-2729, describes it as a deserialization vulnerability via XMLDecoder in Oracle internetLogic Server Web Services. Oracle said: “Due to the severity of this vulnerability, Oracle powerfully recommends that customers apply the updates provided by this Security Alert as shortly as doable.”

April’s vulnerability chop-chop light-emitting diode to attacks, together with the delivery of antecedently unseen ransomware variant dubbed “Sodinokibi”, Cisco Talos security researchers aforementioned. (That ransomware is presently being employed in a very new spam campaign dissimulation to be from Booking.com).

They superimposed in AN analysis last month: “Historically, most kinds of ransomware have needed some variety of user interaction, like a user gap AN attachment to AN email message, clicking on a malicious link, or running a chunk of malware on the device.”

“In this case, the attackers merely leveraged the Oracle WebLogic vulnerability, inflicting the affected server to transfer a replica of the ransomware from attacker-controlled information science addresses”.

Tags:
jayce
Author: 

Comments ( 0 )

No comments available

Add a comment
{{postCtrl.cmtErrMsg}}

Frequently asked questions ( 0 )

No questions available

Back To Top!
Rank
User
Points

Top Contributers

userNamenaveelansari
135850

Top Contributers

userNameayanbhatti
92510

Top Contributers

userNamehamzaahmed
32150

Top Contributers

1
userNamelinuxhelp
31040

Top Contributers

userNamemuhammadali
24500
Can you help Isaiah ?
What is the use of SUID & SGID commands

How to set the special permissions to the files and folders using SUID and SGID commands...

Networking
  • Routing
  • trunk
  • Netmask
  • Packet Capture
  • domain
  • HTTP Proxy
Server Setup
  • NFS
  • KVM
  • Memory
  • Sendmail
  • WebDAV
  • LXC
Shell Commands
  • Cloud commander
  • Command line archive tools
  • last command
  • Shell
  • terminal
  • Throttle
Desktop Application
  • Linux app
  • Pithos
  • Retrospect
  • Scribe
  • TortoiseHg
  • 4Images
Monitoring Tool
  • Monit
  • Apache Server Monitoring
  • EtherApe 
  • Arpwatch Tool
  • Auditd
  • Barman
Web Application
  • Nutch
  • Amazon VPC
  • FarmWarDeployer
  • Rukovoditel
  • Mirror site
  • Chef
Contact Us | Terms of Use| Privacy Policy| Disclaimer
© 2025 LinuxHelp.com All rights reserved. Linux™ is the registered trademark of Linus Torvalds. This site is not affiliated with linus torvalds in any way.