1. About the Vulnerabilities

1.1 Introduction

WebLogic is an application server and middleware developed by Oracle based on the Java EE architecture. WebLogic is a Java application server designed for developing, integrating, deploying, and managing large-scale distributed web apps, network apps, and database apps.

The Java dynamic function and the Java Enterprise standards of safety were introduced in the development, integration, deployment, and management of large-scale web apps. WebLogic is one of the main Java (J2EE) application server software in the commercial market. It is also the world's first successfully commercialized J2EE application server, with the advantages of scalability, rapid development, flexibility, and reliability.

1.2 Summary

On April 17, 2024, Sangfor FarSight Labs received notification of four vulnerabilities in Oracle WebLogic, ranging from medium to high severity. The following table describes these vulnerabilities.

No. Vulnerability Name Affected Versions Severity Level
1 Information Disclosure Vulnerability (CVE-2024-21006) Oracle WebLogic Server 12.2.1.4.0 Oracle WebLogic Server 14.1.1.0.0 High (CVSS Score 7.5)
2 Information Disclosure Vulnerability (CVE-2024-21007) Oracle WebLogic Server 12.2.1.4.0 Oracle WebLogic Server 14.1.1.0.0 High (CVSS Score 7.5)
3 XSS Vulnerability (CVE-2024-23635) Oracle WebLogic Server 12.2.1.4.0 Oracle WebLogic Server 14.1.1.0.0 Medium (CVSS Score 6.1)
4 Denial of Service Vulnerability (CVE-2024-26308) Oracle WebLogic Server 12.2.1.4.0 Oracle WebLogic Server 14.1.1.0.0 Medium (CVSS Score 5.5)

1.3 Description of High-Severity Vulnerabilities

1. Information Disclosure Vulnerability (CVE-2024-21006)

An information disclosure vulnerability was found in Oracle WebLogic Server. Unauthenticated attackers can exploit this vulnerability to steal sensitive information.

2. Information Disclosure Vulnerability (CVE-2024-21007)

An information disclosure vulnerability was found in Oracle WebLogic Server. Unauthenticated attackers can exploit this vulnerability to steal sensitive information.

2. Affected Versions

WebLogic is a Java application server designed for developing, integrating, deploying, and managing large-scale distributed web apps, network apps, and database apps. Assets that may be affected by the vulnerabilities are widely distributed around the world. The affected assets in Guangdong, Beijing, Shanghai, and other provinces and cities account for approximately 70% of the affected assets in China. The vulnerabilities exposed in the current year involve a large number of users, making the vulnerability very serious.

3. Solutions

3.1 Remediation Solutions

3.1.1 Check the Component Version

(1) Check the version of WebLogic Server

Log in to the WebLogic Server console to view its version number.

1

(2) Check the ID of the patch for WebLogic Server

Go to the OPatch directory under the WebLogic Server home directory and run the .\opatch lspatches command, as shown in the figure below.

123

In this example, the patch ID is 31656851.

3.1.2 Install the Patch

For WebLogic Server 12.2.1.3 Step 1 Check the version of OPatch

Go to C:\oracle\Middleware\Oracle_Home\OPatch and run the following command:

C:\oracle\Middleware\Oracle_Home\OPatch > opatch version

If the version is 13.9.4.0.0 or later, perform Step 2. Otherwise, upgrade OPatch.

3

Perform the following steps to upgrade OPatch:

Delete OPatch of an earlier version.

Go to the C:\oracle\Middleware\Oracle_Home directory and rename the following directories: OPatchoracle_commonoui, and inventory.

Download and decompress the patch installation package.

Click the following URL to download the installation patch package: https://updates.oracle.com/Orion/Services/download/p28186730_139400_Generic.zip?aru=22731294&patch_file=p28186730_139400_Generic.zip

WebLogic Server is updated on a regular basis. We recommend that you download the latest patches from the official website (https://support.oracle.com). For information about how to download the latest patches, visit http://blog.itpub.net/31394774/viewspace-2699573

  1. Install OPatch

Run the following command:

java -jar opatch_generic.jar -silent oracle_home=C:\oracle\Middleware\Oracle_Home

If the following error occurs, install OPatch to the bin directory in the JDK installation directory.

4
  1. Check the installation result

New OPatchoracle_commonoui, and inventory directories are generated.

Run the following command: C:\oracle\Middleware\Oracle_Home\OPatch > opatch version

If the upgrade is successful, the OPatch version is changed to 13.9.4.

Step 2 Download and decompress the patch installation package

Click the following URL to download the patch installation package:

https://updates.oracle.com/Orion/Services/download/p29016089_122130_Generic.zip?aru=22640288&patch_file=p29016089_122130_Generic.zip

WebLogic Server is updated on a regular basis. We recommend that you download the latest patches from the official website (https://support.oracle.com). For information about how to download the latest patches, visit http://blog.itpub.net/31394774/viewspace-2699573

Decompress the package to any directory.

Step 3 (Recommended) Read the README file before performing the succeeding steps

Step 4 Stop WebLogic Server

Step 5 Install the patch

Go to the directory in which the decompressed patch installation package is stored and run the following command:

C:\oracle\Middleware\Oracle_Home\OPatch\opatch apply

Step 6 Restart WebLogic Server

Restart WebLogic Server and verify whether services are running properly.

Note: If service exceptions occur, run the following command to roll back the patch:

C:\oracle\Middleware\Oracle_Home\OPatch\opatch rollback -id <patch ID>

For WebLogic Server of earlier versions

Upgrade WebLogic Server to 12.2.1.3 and later. For information about how to upgrade WebLogic Server, please contact Oracle technical support.

3.1.3 Workaround

Note: This temporary mitigation does not completely fix the issue. Users can decide whether to adopt the solution based on their business needs.

  1. This vulnerability can be mitigated by closing the IIOP protocol. Perform the following operations:

Log in to the WebLogic Server console, select Services > Settings for AdminServer > Protocols, deselect Enable IIOP, and restart WebLogic Server.

65

Log in to the WebLogic Server console. In the Domain Structure panel on the left side of the page, click the domain name. On the settings page of the domain name, select Security > Filter. In the text box of Connection Filter, enter security.net.ConnectionFilterImpl.

In the text box of Connection Filter Rules, enter 127.0.0.1 * * allow t3 t3s,0.0.0.0/0 * * deny t3 t3s.

Save the settings and restart the server.

  1. Official Solution

Oracle has released patches for affected versions to fix these vulnerabilities, and affected users are recommended to download the corresponding patches from the following link:

https://www.oracle.com/security-alerts/cpuapr2024.html

5. Timeline

On April 17, 2024, Sangfor FarSight Labs received notification of four vulnerabilities in Oracle WebLogic.

On April 18, 2024, Sangfor FarSight Labs released a vulnerability alert with remediation solutions.

6. References

https://www.oracle.com/security-alerts/cpuapr2024.html

Listen To This Post

Search

Get in Touch

Get in Touch with Sangfor Team for Business Inquiry

Related Articles

See Other Product