New Zero-day flaw discovered in Oracle Web logic server let attackers exploit this vulnerability to remotely execute commands without authorization.
An Oracle web Logic component wls9_async and wls-wsat trigger this deserialization remote command execution vulnerability and it affects all the Weblogic component wls9_async_response.war and wls-wsat.war enabled versions (including the current version).
WebLogic Server is a Java EE application server developed by Oracle Corporation for cloud environments and traditional environments.
A wls9_async_response component is enabled by default in some versions of WebLogic and provides asynchronous communication services for WebLogic Server. When it performing the deserializing input information, a WAR package get distorted.
By taking advantage of this flaw, the attacker can send a carefully constructed malicious HTTP request to gain the permissions of the target server and execute the command remotely without authorization.
Reserachers from KnownSec 404 analysis the impacted weblogic server using ZoomEye is a famous cyberspace search engine and have 101,040 results about Oracle WebLogic server, there are 36,173 results on 2019. Most of them are distributed in the US and China.
According to seebug report, At present, Oracle officially has not released a patch, the temporary solution is as follows:
1, delete the war package and restart webLogic;
2. Control access to the URL of the /_async/* path through the access policy.