Emerging Threat Active Exploit of Oracle WebLogic JSP File Upload Vulnerability

We have seen active exploitation attempts of CVE-2018-2894, an Oracle WebLogic JSP File Upload Vulnerability, by malicious actors against our customers and against our honeynet since July 19, 2018. Successful exploitation provides attackers with shell access to the web server, which is a significant compromise risk. All users of Oracle Weblogic are strongly encouraged to apply security patches for this vulnerability immediately or to take otherwise mitigating actions. 

Details 

CVE-2018-2894 consists of 2 arbitrary file upload vulnerabilities, one targeting config.do and one targeting begin.do.

/ws_utc/config.do Execution 

  • GET request to retrieve application settings at /ws_utc/resources/setting/options/general 
  • POST request to change the application working directory to one that is accessible over HTTP. Request sent to path : /ws_utc/resources/setting/options. 
  • POST request to upload arbitrary file to said working directory. Request sent to path : /ws_utc/css/config/keystore/. 
  • This vulnerability can be exploited remote and unauthenticated

/ws_utc/begin.do Execution 

  • POST request to /ws_utc/resources/ws/config/import. Path traversal vulnerability in the multipart form name which allows attackers to upload a file to anywhere in the filesystem. 
  • In our testing of each version, authentication was required to access and exploit this vector. 

The vulnerable Web Service Test client application is enabled by default when WebLogic is deployed in developer mode, and can be enabled on production mode. We observed the first attacks (config.do variation) against our honeynet on 19th July and have observed attacks against customers consistently since. This was observed almost exactly 1 day before exploit code was released on GitHub. 

Suggested Actions 

Remediate by applying latest patches or upgrading to the latest version of WebLogic. 

Remediate by running WebLogic in production mode with the option “Enable Web Service Test Page” disabled (Console -> domain -> advanced).

Additional Resources / References



*** This is a Security Bloggers Network syndicated blog from Alert Logic - Blogs Feed authored by Alert Logic - Blogs Feed. Read the original post at: https://test.alertlogic.com/emerging-threat-active-exploit-of-oracle-weblogic-jsp-file-upload-vulnerability/