Advisory Details

October 22nd, 2020

Oracle WebLogic Server T3 Protocol Deserialization of Untrusted Data Remote Code Execution Vulnerability

ZDI-20-1282
ZDI-CAN-11829

CVE ID CVE-2020-14825
CVSS SCORE 9.8, AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AFFECTED VENDORS Oracle
AFFECTED PRODUCTS WebLogic Server
VULNERABILITY DETAILS

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Oracle WebLogic Server. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the handling of the T3 protocol. Crafted data in a T3 protocol message can trigger the deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of the service account.

ADDITIONAL DETAILS Oracle has issued an update to correct this vulnerability. More details can be found at:
https://www.oracle.com/security-alerts/cpuoct2020.html
DISCLOSURE TIMELINE
  • 2020-10-06 - Vulnerability reported to vendor
  • 2020-10-22 - Coordinated public release of advisory
CREDIT Quynh Le of VNPT ISC
BACK TO ADVISORIES