QID 87530

Date Published: 2023-01-18

QID 87530: Oracle WebLogic Server Multiple Vulnerabilities (CPUJAN2023)

Oracle WebLogic Server (formerly known as BEA WebLogic Server) is an application server for building and deploying enterprise applications and services.
The Oracle WebLogic Server component in Oracle Fusion Middleware for versions 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0 has fixes for multiple vulnerabilities.

Affected Versions:
Oracle WebLogic Server, version(s) 12.2.1.3,12.2.1.4 and 14.1.1.0

QID Detection Logic (Authenticated):
Operating System: Linux
This QID checks to see if Oracle WebLogic Server process is listening on any of the TCP ports. If so, for version 12.x it gets the "Oracle_Home" path, navigates to that directory and reads "registry.xml" and the patch files found in the directory "Oracle_Home"\inventory\patches to check if the installed version is patched.
QID Detection Logic (Authenticated):
Operating System: Windows
For affected 12.x version
The QID checks the "Oracle_Home" path with help of the registry key "HKLM\Software\Oracle". The QID verifies if the affected WebLogic version is installed on the host and then checks if the corresponding patch is applied or not.

Patch IDs checked:
WebLogic Server 14.1.1.0 - Patch 34890864
WebLogic Server 12.2.1.4 - Patch 34883826
WebLogic Server 12.2.1.3 - Patch 34883781

QID Detection Logic (Unauthenticated) :
The qid sends a "GET console/login/LoginForm.jsp" request to retrieve the WebLogic version installed.

Successful exploitation could allow an attacker to affect the confidentiality, integrity and availability of data on the target system.

  • CVSS V3 rated as Critical - 9.8 severity.
  • CVSS V2 rated as High - 7.5 severity.
  • Solution
    The vendor has released patches for these issues. Customers are advised to refer to Oracle CPUJAN2023 for detailed information.

    Software Advisories
    Advisory ID Software Component Link
    CPUJAN2023 URL Logo www.oracle.com/security-alerts/cpujan2023.html#AppendixFMW