Vulnerabilities > CVE-2008-5457 - Multiple vulnerability in Oracle January 2009 Critical Patch Update

047910
CVSS 10.0 - CRITICAL
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
COMPLETE
Integrity impact
COMPLETE
Availability impact
COMPLETE
network
low complexity
oracle
critical
nessus
exploit available
metasploit

Summary

Unspecified vulnerability in the Oracle BEA WebLogic Server Plugins for Apache, Sun and IIS web servers component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, 8.1 SP6, and 7.0 SP7 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.

Exploit-Db

  • descriptionOracle WebLogic IIS connector JSESSIONID Remote Overflow Exploit. CVE-2008-5457. Remote exploit for windows platform
    idEDB-ID:8336
    last seen2016-02-01
    modified2009-04-01
    published2009-04-01
    reporterGuido Landi
    sourcehttps://www.exploit-db.com/download/8336/
    titleOracle WebLogic IIS connector JSESSIONID Remote Overflow Exploit
  • descriptionBEA WebLogic JSESSIONID Cookie Value Overflow. CVE-2008-5457. Remote exploit for windows platform
    idEDB-ID:16762
    last seen2016-02-02
    modified2010-07-03
    published2010-07-03
    reportermetasploit
    sourcehttps://www.exploit-db.com/download/16762/
    titleBEA WebLogic JSESSIONID Cookie Value Overflow

Metasploit

descriptionThis module exploits a buffer overflow in BEA's WebLogic plugin. The vulnerable code is only accessible when clustering is configured. A request containing a long JSESSION cookie value can lead to arbitrary code execution.
idMSF:EXPLOIT/WINDOWS/HTTP/BEA_WEBLOGIC_JSESSIONID
last seen2020-03-10
modified2017-09-14
published2009-03-27
referenceshttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5457
reporterRapid7
sourcehttps://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/windows/http/bea_weblogic_jsessionid.rb
titleBEA WebLogic JSESSIONID Cookie Value Overflow

Nessus

NASL familyWeb Servers
NASL idWEBLOGIC_PLUG_IN_1166189.NASL
descriptionThe remote web server is using the WebLogic plug-in for Apache, IIS, or Sun web servers, a module included with Oracle (formerly BEA) WebLogic Server and used to proxy requests from an HTTP server to WebLogic. The version of this plug-in on the remote host is affected by an as-yet unspecified buffer overflow that is triggered when processing a specially crafted request. An unauthenticated, remote attacker can leverage this issue to execute arbitrary code on the remote host. Note that Nessus has not tried to exploit this issue but rather has only checked the affected plug-in
last seen2020-06-01
modified2020-06-02
plugin id35374
published2009-01-15
reporterThis script is Copyright (C) 2009-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/35374
titleOracle WebLogic Server Plug-in Remote Overflow (1166189)
code
#
# (C) Tenable Network Security, Inc.
#


include("compat.inc");

if (description)
{
  script_id(35374);
  script_version("1.25");

  script_cve_id("CVE-2008-5457");
  script_bugtraq_id(33177);
  script_xref(name:"Secunia", value:"33526");

  script_name(english:"Oracle WebLogic Server Plug-in Remote Overflow (1166189)");
  script_summary(english:"Checks the plug-in's build timestamp / change number");

  script_set_attribute(attribute:"synopsis", value:
"The remote web server uses a module that is affected by a buffer
overflow vulnerability." );
  script_set_attribute(attribute:"description", value:
"The remote web server is using the WebLogic plug-in for Apache, IIS,
or Sun web servers, a module included with Oracle (formerly BEA)
WebLogic Server and used to proxy requests from an HTTP server to
WebLogic. 

The version of this plug-in on the remote host is affected by an
as-yet unspecified buffer overflow that is triggered when processing a
specially crafted request.  An unauthenticated, remote attacker can
leverage this issue to execute arbitrary code on the remote host. 

Note that Nessus has not tried to exploit this issue but rather has
only checked the affected plug-in's change number / build timestamp." );
   # http://www.oracle.com/technetwork/topics/security/whatsnew/index.html
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?2b7fdf57" );
  script_set_attribute(attribute:"see_also", value:"https://securitytracker.com/id?1021571" );
  script_set_attribute(attribute:"solution", value:
"Install the latest web server plug-in as described in the vendor
advisory above." );
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");
  script_set_attribute(attribute:"exploit_framework_core", value:"true");
  script_set_attribute(attribute:"d2_elliot_name", value:"Oracle Secure Backup 10.2.0.2 RCE (Windows)");
  script_set_attribute(attribute:"exploit_framework_d2_elliot", value:"true");
  script_set_attribute(attribute:"metasploit_name", value:'BEA WebLogic JSESSIONID Cookie Value Overflow');
  script_set_attribute(attribute:"exploit_framework_metasploit", value:"true");
 script_set_attribute(attribute:"plugin_publication_date", value: "2009/01/15");
 script_cvs_date("Date: 2018/11/15 20:50:26");
  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe",value:"cpe:/a:oracle:weblogic_server");
  script_set_attribute(attribute:"exploited_by_nessus", value:"true");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Web Servers");

  script_copyright(english:"This script is Copyright (C) 2009-2018 Tenable Network Security, Inc.");

  script_dependencies("http_version.nasl");
  script_exclude_keys("Settings/disable_cgi_scanning");
  script_require_ports("Services/www", 80);

  exit(0);
}


include("global_settings.inc");
include("misc_func.inc");
include("http.inc");


port = get_http_port(default:80);
if (!get_port_state(port)) exit(0);


# Iterate over known directories.
dirs = get_kb_list(string("www/", port, "/content/directories"));
if (isnull(dirs)) dirs = make_list("", "/weblogic");

foreach dir (dirs)
{
  # Look for the plug-in and a bridge message.
  url = string(dir, "/index.jsp");

  res = http_send_recv3(method:"GET", item:url, port:port);
  if (res == NULL) exit(0);

  # nb: if there's a problem with configured WebLogic server, the initial
  #     request results in a bridge message we can use to fingerprint the
  #     plug-in. Otherwise, we pass in a special request to "tickle" one.
  if ("X-Powered-By: Servlet" >< res[1])
  {
    res = http_send_recv3(
      method:"POST", 
      item:url, 
      port:port,
      add_headers:make_array("Content-Length", "-1")
    );
    if (res == NULL) exit(0);
  }

  # If it's a bridge message...
  if (
    # from Apache or...
    "TITLE>Weblogic Bridge Message" >< res[2] ||
    "Failure of server APACHE bridge:</H2>" >< res[2] ||
    # from IIS or...
    "Message from the ISAPI plugin:</H2>" >< res[2] ||
    # from Sun
    "Message from the NSAPI plugin:</H2>" >< res[2]
  )
  {
    build = "";
    change = "";

    foreach line (split(res[2], keep:FALSE))
    {
      if ("Build date/time:" >< line)
      {
        build = strstr(line, "Build date/time:") - "Build date/time:";
        build = ereg_replace(pattern:"<[^>]+>", replace:"", string:build);
        build = ereg_replace(pattern:"^ +", replace:"", string:build);
      }
      if ("Change Number:" >< line)
      {
        change = strstr(line, "Change Number:") - "Change Number:";
        change = ereg_replace(pattern:"<[^>]+>", replace:"", string:change);
        change = ereg_replace(pattern:"^ +", replace:"", string:change);
      }
      if (build && change) break;
    }

    if (
      (change && int(change) < 1166189) ||
      (
        build && 
        (
          build =~ "^[A-Za-z]{3} ( |[0-3])[0-9] (1[0-9]{3}|200[0-7]) " ||
          build =~ "^(Jan|Feb|Mar|Apr|May|Jun|Jul|Aug|Sep|Oct) ( |[0-3])[0-9] 2008 "
        )
      )
    )
    {
      if (report_verbosity > 0)
      {
        type = "unknown";
        if (
          "TITLE>Weblogic Bridge Message" >< res[2] ||
          "Failure of server APACHE bridge:</H2>" >< res[2]
        ) type = "Apache";
        else if ("Message from the ISAPI plugin:</H2>" >< res[2]) type = "IIS";
        else if ("Message from the NSAPI plugin:</H2>" >< res[2]) type = "Sun";
        else type = "unknown";

        report = string(
          "\n",
          "Nessus was able to retrieve the following information about the remote\n",
          "WebLogic plug-in :\n",
          "\n",
          "  Plug-in type    : ", type, "\n"
        );
        if (build)
        {
          report = string(
            report,
            "  Build date/time : ", build, "\n"
          );
        }
        if (change)
        {
          report = string(
            report,
            "  Change number   : ", change, "\n"
          );
        }
        if (report_verbosity > 1)
        {
          report = string(
            report,
            "\n",
            "It is configured to proxy requests such as :\n",
            "\n",
            "  ", build_url(port:port, qs:url), "\n"
          );
        }
        security_hole(port:port, extra:report);
      }
      else security_hole(port);
    }

    # We've found the plug-in so we're done.
    exit(0);
  }
}

Packetstorm

Saint

  • bid33177
    descriptionOracle Secure Backup NDMP_CONECT_CLIENT_AUTH buffer overflow
    iddatabase_oracle_backupndmpbo,database_oracle_backupver
    osvdb51340
    titleoracle_secure_backup_ndmp_clientauth
    typeremote
  • bid33177
    descriptionOracle Secure Backup login.php ora_osb_lcookie command execution
    iddatabase_oracle_backupver
    osvdb51343
    titleoracle_secure_backup_login_lcookie
    typeremote
  • bid33177
    descriptionOracle WebLogic Server IIS Connector JSESSIONID buffer overflow
    titleweblogic_iis_connector_jsessionid
    typeremote
  • bid33177
    descriptionOracle Secure Backup login.php rbtool command injection
    iddatabase_oracle_backupver
    osvdb51342
    titleoracle_secure_backup_login_rbtool
    typeremote
  • bid33177
    descriptionOracle Database OLAP component ODCITABLESTART buffer overflow
    iddatabase_oracle_version
    osvdb51347
    titleoracle_olap_odcitablestart
    typeremote

Seebug

bulletinFamilyexploit
descriptionNo description provided by source.
idSSV:10935
last seen2017-11-19
modified2009-04-02
published2009-04-02
reporterRoot
sourcehttps://www.seebug.org/vuldb/ssvid-10935
titleOracle WebLogic IIS connector JSESSIONID Remote Overflow Exploit