Описание
Stack-based buffer overflow in the Apache Connector (mod_wl) in Oracle WebLogic Server (formerly BEA WebLogic Server) 10.3 and earlier allows remote attackers to execute arbitrary code via a long HTTP version string, as demonstrated by a string after "POST /.jsp" in an HTTP request.
Ссылки
- Vendor Advisory
- US Government Resource
- Vendor Advisory
- US Government Resource
Уязвимые конфигурации
Конфигурация 1Версия до 10.3 (включая)
Одно из
cpe:2.3:a:bea:weblogic_server:3.1.8:*:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:4.0:*:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:4.0.4:*:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:4.5:*:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:4.5.1:*:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:4.5.1:sp15:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:4.5.2:*:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:4.5.2:sp1:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:4.5.2:sp2:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:5.1:*:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:5.1:sp1:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:5.1:sp10:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:5.1:sp11:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:5.1:sp12:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:5.1:sp13:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:5.1:sp2:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:5.1:sp3:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:5.1:sp4:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:5.1:sp5:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:5.1:sp6:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:5.1:sp7:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:5.1:sp8:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:5.1:sp9:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:6.0:*:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:6.0:sp1:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:6.0:sp2:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:6.0:sp6:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:6.1:*:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:6.1:sp1:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:6.1:sp2:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:6.1:sp3:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:6.1:sp4:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:6.1:sp5:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:6.1:sp6:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:6.1:sp7:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:6.1:sp8:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:7.0:*:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:7.0:sp1:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:7.0:sp2:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:7.0:sp3:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:7.0:sp4:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:7.0:sp5:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:7.0:sp6:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:7.0:sp7:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:7.0.0.1:*:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:7.0.0.1:sp1:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:7.0.0.1:sp2:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:7.0.0.1:sp3:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:7.0.0.1:sp4:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:8.1:*:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:8.1:sp1:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:8.1:sp2:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:8.1:sp3:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:8.1:sp4:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:8.1:sp5:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:8.1:sp6:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:9.0:*:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:9.0:ga:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:9.0:sp1:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:9.0:sp2:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:9.0:sp3:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:9.0:sp4:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:9.0:sp5:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:9.1:*:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:9.1:ga:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:9.2:*:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:9.2:mp1:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:9.2:mp2:*:*:*:*:*:*
cpe:2.3:a:bea:weblogic_server:10.0:*:*:*:*:*:*:*
cpe:2.3:a:bea_systems:apache_connector_in_weblogic_server:*:*:*:*:*:*:*:*
cpe:2.3:a:bea_systems:weblogic_server:10.0_mp1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:weblogic_server:*:*:*:*:*:*:*:*
EPSS
Процентиль: 99%
0.81326
Высокий
10 Critical
CVSS2
Дефекты
CWE-119
Связанные уязвимости
github
почти 4 года назад
Stack-based buffer overflow in the Apache Connector (mod_wl) in Oracle WebLogic Server (formerly BEA WebLogic Server) 10.3 and earlier allows remote attackers to execute arbitrary code via a long HTTP version string, as demonstrated by a string after "POST /.jsp" in an HTTP request.
EPSS
Процентиль: 99%
0.81326
Высокий
10 Critical
CVSS2
Дефекты
CWE-119