Rule Category

SERVER-ORACLE -- Snort has detected traffic exploiting vulnerabilities in Oracle Database Server.

Alert Message

SERVER-ORACLE Oracle WebLogic unsafe deserialization remote code execution attempt

Rule Explanation

This event is generated when an attacker attempts to exploit CVE-2019-2890. Impact: Attempted User Privilege Gain Details: Oracle WebLogic is vulnerable to an unsafe deserialization vulnerability in the PersistentContext class that could lead to remote code execution. Attackers who abuse this will potentially gain a foothold into a compromised system, which may lead to further exploitation. Ease of Attack:

What To Look For

Known Usage

No public information

False Positives

No known false positives

Contributors

Cisco Talos Intelligence Group

MITRE ATT&CK Framework

Tactic:

Technique:

For reference, see the MITRE ATT&CK vulnerability types here: https://attack.mitre.org

CVE

Additional Links

Rule Vulnerability

CVE Additional Information

CVE-2019-2890
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Web Services). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0 and 12.2.1.3.0. Easily exploitable vulnerability allows high privileged attacker with network access via T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 7.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).
Details
SeverityMEDIUM Base Score6.5
Impact Score6.4 Exploit Score8.0
Confidentiality ImpactPARTIAL Integrity ImpactPARTIAL
Availability ImpactPARTIAL Access VectorNETWORK
AuthenticationSINGLE Ease of AccessLOW