Skip to content

Commit 6301527

Browse files
authored
20241016001 - Oracle WebLogic Server Vulnerability (#1046)
* Format markdown docs * 20241016001 - Oracle WebLogic Server Vulnerability * Format markdown docs * Updated cve link to match template * Format markdown docs --------- Co-authored-by: carel-v98 <[email protected]>
1 parent 0fb47b8 commit 6301527

2 files changed

+37
-4
lines changed

docs/advisories/20240503001-Apache-ActiveMQ-Vulnerability.md

+2-4
Original file line numberDiff line numberDiff line change
@@ -7,12 +7,10 @@ In Apache ActiveMQ 6.x, the default configuration doesn't secure the API web con
77
To mitigate, users can update the default conf/jetty.xml configuration file to add authentication requirement:
88

99
```xml
10-
<?xml version="1.0" encoding="utf-8"?>
1110
<bean class="org.eclipse.jetty.security.ConstraintMapping" id="securityConstraintMapping">
12-
<property name="constraint" ref="securityConstraint"/>
13-
<property name="pathSpec" value="/"/>
11+
<property name="constraint" ref="securityConstraint" />
12+
<property name="pathSpec" value="/" />
1413
</bean>
15-
1614
```
1715

1816
Or Apache encourage users to upgrade to Apache ActiveMQ 6.1.2 where the default configuration has been updated with authentication by default.
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,35 @@
1+
# Oracle WebLogic Server Vulnerability - 20241016001
2+
3+
## Overview
4+
5+
The WA SOC has been made aware of an easily exploitable vulnerability that allows an unauthenticated attacker with network access via T3, IIOP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server.
6+
7+
## What is vulnerable?
8+
9+
\<\<\<\<\<\<\< HEAD
10+
11+
| Product(s) Affected | Version(s) | CVE | CVSS | Severity |
12+
| ---------------------- | ---------------------------------- | ----------------------------------------------------------------- | ---- | ------------ |
13+
| Oracle WebLogic Server | Versions 12.2.1.4.0 and 14.1.1.0.0 | [CVE-2024-21216](https://nvd.nist.gov/vuln/detail/CVE-2024-21216) | 9.8 | **Critical** |
14+
15+
=== ====
16+
17+
| Product(s) Affected | Version(s) | CVE | CVSS | Severity |
18+
| ---------------------- | ---------------------------------- | ---------------------------------------------------------------- | ---- | ------------ |
19+
| Oracle WebLogic Server | Versions 12.2.1.4.0 and 14.1.1.0.0 | CVE-2024-21216 <https://nvd.nist.gov/vuln/detail/CVE-2024-21216> | 9.8 | **Critical** |
20+
21+
> > > > > > > 9bc5b469935722a2c401725b707dd37601db910f
22+
23+
## What has been observed?
24+
25+
There is no evidence of exploitation affecting Western Australian Government networks at the time of publishing.
26+
27+
## Recommendation
28+
29+
The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframe of *48 hours...* (refer [Patch Management](../guidelines/patch-management.md)):
30+
31+
- <https://www.oracle.com/security-alerts/cpuoct2024.html>
32+
33+
## Additional References
34+
35+
- Tenable: <https://www.tenable.com/cve/CVE-2024-21216>

0 commit comments

Comments
 (0)