Vulnerabilities > CVE-2017-10352 - Unspecified vulnerability in Oracle Weblogic Server

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
oracle
nessus

Summary

Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS - Web Services). The supported version that is affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.1.0, 12.2.1.2.0 and 12.2.1.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. While the vulnerability is in Oracle WebLogic Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle WebLogic Server as well as unauthorized update, insert or delete access to some of Oracle WebLogic Server accessible data and unauthorized read access to a subset of Oracle WebLogic Server accessible data. CVSS 3.0 Base Score 9.9 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:H).

Nessus

  • NASL familyMisc.
    NASL idORACLE_WEBLOGIC_SERVER_CPU_OCT_2017.NASL
    descriptionThe version of Oracle WebLogic Server installed on the remote host is affected by multiple vulnerabilities
    last seen2020-06-01
    modified2020-06-02
    plugin id103935
    published2017-10-18
    reporterThis script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/103935
    titleOracle WebLogic Server Multiple Vulnerabilities (October 2017 CPU)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(103935);
      script_version("1.12");
      script_cvs_date("Date: 2019/11/12");
    
      script_cve_id(
        "CVE-2017-10152",
        "CVE-2017-10271",
        "CVE-2017-10334",
        "CVE-2017-10336",
        "CVE-2017-10352"
      );
      script_bugtraq_id(101304, 101351, 101392);
    
      script_name(english:"Oracle WebLogic Server Multiple Vulnerabilities (October 2017 CPU)");
      script_summary(english:"Checks for the patch.");
    
      script_set_attribute(attribute:"synopsis", value:
    "An application server installed on the remote host is affected by
    multiple vulnerabilities.");
      script_set_attribute(attribute:"description", value:
    "The version of Oracle WebLogic Server installed on the remote host is
    affected by multiple vulnerabilities");
      # http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?1e07fa0e");
      script_set_attribute(attribute:"solution", value:
    "Apply the appropriate patch according to the October 2017 Oracle
    Critical Patch Update advisory.");
      script_set_attribute(attribute:"agent", value:"all");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:ND");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:H");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:H/RL:O/RC:X");
      script_set_attribute(attribute:"cvss_score_source", value:"CVE-2017-10352");
    
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
      script_set_attribute(attribute:"exploited_by_malware", value:"true");
      script_set_attribute(attribute:"metasploit_name", value:'Oracle Weblogic Server Deserialization RCE - AsyncResponseService');
      script_set_attribute(attribute:"exploit_framework_metasploit", value:"true");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2017/10/17");
      script_set_attribute(attribute:"patch_publication_date", value:"2017/10/17");
      script_set_attribute(attribute:"plugin_publication_date", value:"2017/10/18");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:oracle:fusion_middleware");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:oracle:weblogic_server");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"Misc.");
    
      script_copyright(english:"This script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
    
      script_dependencies("oracle_weblogic_server_installed.nbin", "os_fingerprint.nasl");
      script_require_keys("installed_sw/Oracle WebLogic Server");
    
      exit(0);
    }
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    include("install_func.inc");
    
    app_name = "Oracle WebLogic Server";
    
    install = get_single_install(app_name:app_name, exit_if_unknown_ver:TRUE);
    ohome = install["Oracle Home"];
    subdir = install["path"];
    version = install["version"];
    
    fix = NULL;
    fix_ver = NULL;
    
    # individual security patches
    if (version =~ "^10\.3\.6\.")
    {
      fix_ver = "10.3.6.0.171017";
      fix = "26519424";
    }
    else if (version =~ "^12\.1\.3\.")
    {
      fix_ver = "12.1.3.0.171017";
      fix = "26519417";
    }
    else if (version =~ "^12\.2\.1\.1($|[^0-9])")
    {
      fix_ver = "12.2.1.1.171017";
      fix = "26519400";
    }
    else if (version =~ "^12\.2\.1\.2($|[^0-9])")
    {
      fix_ver = "12.2.1.2.171017";
      fix = "26485996";
    }
    
    if (!isnull(fix_ver) && ver_compare(ver:version, fix:fix_ver, strict:FALSE) == -1)
    {
      os = get_kb_item_or_exit("Host/OS");
      if ('windows' >< tolower(os))
      {
        port = get_kb_item("SMB/transport");
        if (!port) port = 445;
      }
      else port = 0;
    
      report =
        '\n  Oracle home    : ' + ohome +
        '\n  Install path   : ' + subdir +
        '\n  Version        : ' + version +
        '\n  Required Patch : ' + fix +
        '\n';
      security_report_v4(extra:report, port:port, severity:SECURITY_HOLE);
    }
    else audit(AUDIT_INST_PATH_NOT_VULN, app_name, version, subdir);
    
  • NASL familyWeb Servers
    NASL idSUN_JAVA_WEB_SERVER_7_0_27.NASL
    descriptionAccording to its self-reported version, the Oracle iPlanet Web Server (formerly known as Sun Java System Web Server) running on the remote host is 7.0.x prior to 7.0.27 Patch 26834070. It is, therefore, affected by an unspecified vulnerability in the Network Security Services (NSS) library with unknown impact.
    last seen2020-06-01
    modified2020-06-02
    plugin id106349
    published2018-01-25
    reporterThis script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/106349
    titleOracle iPlanet Web Server 7.0.x < 7.0.27 NSS Unspecified Vulnerability (January 2018 CPU)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(106349);
      script_version("1.7");
      script_cvs_date("Date: 2019/11/08");
    
      script_cve_id(
        "CVE-2015-7501",
        "CVE-2015-7940",
        "CVE-2016-0635",
        "CVE-2016-1182",
        "CVE-2016-2107",
        "CVE-2016-2179",
        "CVE-2017-3732",
        "CVE-2017-5645",
        "CVE-2017-9798",
        "CVE-2017-10068",
        "CVE-2017-10262",
        "CVE-2017-10273",
        "CVE-2017-10352",
        "CVE-2017-12617",
        "CVE-2018-2561",
        "CVE-2018-2564",
        "CVE-2018-2584",
        "CVE-2018-2594",
        "CVE-2018-2595",
        "CVE-2018-2596",
        "CVE-2018-2601",
        "CVE-2018-2610",
        "CVE-2018-2625",
        "CVE-2018-2711",
        "CVE-2018-2713",
        "CVE-2018-2715",
        "CVE-2018-2733"
      );
      script_bugtraq_id(
        78215,
        79091,
        89760,
        91067,
        91869,
        92987,
        95814,
        97702,
        98050,
        100872,
        100954,
        102442,
        102535,
        102539,
        102541,
        102545,
        102550,
        102553,
        102558,
        102562,
        102565,
        102567,
        102569,
        102573,
        102634,
        102637,
        102641,
        102643
      );
    
      script_name(english:"Oracle iPlanet Web Server 7.0.x < 7.0.27 NSS Unspecified Vulnerability (January 2018 CPU)");
      script_summary(english:"Checks the version in the admin console.");
    
      script_set_attribute(attribute:"synopsis", value:
    "The remote web server is affected by an unspecified vulnerability.");
      script_set_attribute(attribute:"description", value:
    "According to its self-reported version, the Oracle iPlanet Web Server
    (formerly known as Sun Java System Web Server) running on the remote
    host is 7.0.x prior to 7.0.27 Patch 26834070. It is, therefore,
    affected by an unspecified vulnerability in the Network Security
    Services (NSS) library with unknown impact.");
      # http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?ae82f1b1");
      # https://support.oracle.com/epmos/faces/SearchDocDisplay?_adf.ctrl-state=14v5w3zyq8_4&_afrLoop=466151680153736#babhdcfj
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?fccabced");
      script_set_attribute(attribute:"solution", value:
    "Upgrade to Oracle iPlanet Web Server version 7.0.27 or later as
    referenced in the January 2018 Oracle Critical Patch Update advisory.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:F/RL:O/RC:C");
      script_set_attribute(attribute:"cvss_score_source", value:"CVE-2015-7501");
    
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
      script_set_attribute(attribute:"exploit_framework_core", value:"true");
      script_set_attribute(attribute:"d2_elliot_name", value:"Apache Tomcat for Windows HTTP PUT Method File Upload");
      script_set_attribute(attribute:"exploit_framework_d2_elliot", value:"true");
      script_set_attribute(attribute:"metasploit_name", value:'Tomcat RCE via JSP Upload Bypass');
      script_set_attribute(attribute:"exploit_framework_metasploit", value:"true");
      script_set_attribute(attribute:"exploit_framework_canvas", value:"true");
      script_set_attribute(attribute:"canvas_package", value:'CANVAS');
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2017/01/17");
      script_set_attribute(attribute:"patch_publication_date", value:"2017/01/17");
      script_set_attribute(attribute:"plugin_publication_date", value:"2018/01/25");
    
      script_set_attribute(attribute:"plugin_type", value:"remote");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:oracle:iplanet_web_server");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:mozilla:network_security_services");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"Web Servers");
    
      script_copyright(english:"This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
    
      script_dependencies("oracle_iplanet_web_server_detect.nbin");
      script_require_keys("installed_sw/Oracle iPlanet Web Server");
    
      exit(0);
    }
    
    include("global_settings.inc");
    include("audit.inc");
    include("misc_func.inc");
    include("install_func.inc");
    include("http.inc");
    
    app_name = "Oracle iPlanet Web Server";
    port = get_http_port(default:8989);
    
    install = get_single_install(app_name:app_name, port:port, exit_if_unknown_ver:TRUE);
    version = install['version'];
    
    fix = "7.0.27";
    min = "7.0";
    
    
    
    # Affected 7.0.x < 7.0.27
    if (
      ver_compare(ver:version, fix:min, strict:FALSE) >= 0 &&
      ver_compare(ver:version, fix:fix, strict:FALSE) == -1
    )
    {
      report = report_items_str(
        report_items:make_array(
          "Installed version", version,
          "Fixed version", fix
        ),
        ordered_fields:make_list("Installed version", "Fixed version")
      );
      security_report_v4(port:port, severity:SECURITY_HOLE, extra:report);
    }
    else audit(AUDIT_LISTEN_NOT_VULN, app_name, port, version);
    
  • NASL familyWeb Servers
    NASL idORACLE_HTTP_SERVER_CPU_JAN_2018.NASL
    descriptionThe version of Oracle HTTP Server installed on the remote host is affected by multiple vulnerabilities as noted in the January 2018 CPU advisory.
    last seen2020-03-18
    modified2018-01-24
    plugin id106299
    published2018-01-24
    reporterThis script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/106299
    titleOracle Fusion Middleware Oracle HTTP Server Multiple Vulnerabilities (January 2018 CPU)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include('compat.inc');
    
    if (description)
    {
      script_id(106299);
      script_version("1.16");
      script_set_attribute(attribute:"plugin_modification_date", value:"2020/02/25");
    
      script_cve_id(
        "CVE-2015-7501",
        "CVE-2015-7940",
        "CVE-2016-0635",
        "CVE-2016-1182",
        "CVE-2016-2107",
        "CVE-2016-2179",
        "CVE-2017-3732",
        "CVE-2017-5461",
        "CVE-2017-5645",
        "CVE-2017-9798",
        "CVE-2017-10068",
        "CVE-2017-10262",
        "CVE-2017-10273",
        "CVE-2017-10352",
        "CVE-2017-12617",
        "CVE-2018-2561",
        "CVE-2018-2564",
        "CVE-2018-2584",
        "CVE-2018-2596",
        "CVE-2018-2601",
        "CVE-2018-2625",
        "CVE-2018-2711",
        "CVE-2018-2713",
        "CVE-2018-2715",
        "CVE-2018-2760"
      );
      script_bugtraq_id(
        78215,
        79091,
        89760,
        91067,
        91869,
        92987,
        95814,
        97702,
        98050,
        100872,
        100954,
        102442,
        102535,
        102539,
        102541,
        102545,
        102550,
        102553,
        102558,
        102562,
        102565,
        102567,
        102569,
        102573,
        103826
      );
    
      script_name(english:"Oracle Fusion Middleware Oracle HTTP Server Multiple Vulnerabilities (January 2018 CPU)");
    
      script_set_attribute(attribute:"synopsis", value:
    "The remote web server is affected by multiple vulnerabilities.");
      script_set_attribute(attribute:"description", value:
    "The version of Oracle HTTP Server installed on the remote host is
    affected by multiple vulnerabilities as noted in the January 2018
    CPU advisory.");
      # http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html#AppendixFMW
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?6072c657");
      # http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?76507bf8");
      script_set_attribute(attribute:"solution", value:
    "Apply the appropriate patch according to the January 2018 Oracle Critical
    Patch Update advisory.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
      script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:F/RL:O/RC:C");
      script_set_attribute(attribute:"cvss_score_source", value:"CVE-2015-7501");
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
      script_set_attribute(attribute:"exploit_framework_core", value:"true");
      script_set_attribute(attribute:"d2_elliot_name", value:"Apache Tomcat for Windows HTTP PUT Method File Upload");
      script_set_attribute(attribute:"exploit_framework_d2_elliot", value:"true");
      script_set_attribute(attribute:"metasploit_name", value:'Tomcat RCE via JSP Upload Bypass');
      script_set_attribute(attribute:"exploit_framework_metasploit", value:"true");
      script_set_attribute(attribute:"exploit_framework_canvas", value:"true");
      script_set_attribute(attribute:"canvas_package", value:'CANVAS');
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2018/01/16");
      script_set_attribute(attribute:"patch_publication_date", value:"2018/01/16");
      script_set_attribute(attribute:"plugin_publication_date", value:"2018/01/24");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:oracle:fusion_middleware");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:oracle:http_server");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"Web Servers");
    
      script_copyright(english:"This script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
    
      script_dependencies("oracle_http_server_installed.nbin");
      script_require_keys("Oracle/OHS/Installed");
    
      exit(0);
    }
    
    include('oracle_http_server_patch_func.inc');
    
    get_kb_item_or_exit('Oracle/OHS/Installed');
    install_list = get_kb_list_or_exit('Oracle/OHS/*/EffectiveVersion');
    
    install = branch(install_list, key:TRUE, value:TRUE);
    
    patches = make_array();
    patches['11.1.1.7'] = make_array('fix_ver', '11.1.1.7.180116', 'patch', '27197885');
    patches['11.1.1.9'] = make_array('fix_ver', '11.1.1.9.180116', 'patch', '27301611');
    patches['12.1.3.0'] = make_array('fix_ver', '12.1.3.0.190130', 'patch', '27244723');
    patches['12.2.1.2'] = make_array('fix_ver', '12.2.1.2.171220', 'patch', '27198002');
    patches['12.2.1.3'] = make_array('fix_ver', '12.2.1.3.171117', 'patch', '27149535');
    
    oracle_http_server_check_vuln(
      install : install,
      min_patches : patches,
      severity : SECURITY_HOLE
    );