With bug public, Oracle rushes out WebLogic fix

WebLogic zero-day flaw that could compromise the server was disclosed two weeks ago

Oracle has rushed out a patch for its WebLogic application server, two weeks after a Russian security researcher posted details of the vulnerability.

The flaw lies in WebLogic's Node Manager software, which is typically blocked at the firewall. However, if hacker is able to access Node Manager's administrative port, the results could be devastating, Oracle said. "A successful exploitation of this vulnerability may result in a full compromise of the targeted server on Windows. On other platforms (Unix, Linux, etc.), the attacker may gain access to the targeted server with the same privileges as the WebLogic server processes," Oracle wrote in a blog post detailing the issue.

[ Discover what's new in business applications with InfoWorld's Technology: Applications newsletter and Killer Apps blog. ]

Oracle issued its most-recent set of security patches on Jan. 12, but was apparently forced to rush out a WebLogic patch after security research firm Intevydis went public with details of the flaw on Jan. 23. The Russian company posted information on dozens of vulnerabilities during the month of January, in an effort to draw attention to he large number of server and database vulnerabilities that are not being patched.

An Oracle spokeswoman declined to comment on the patch. In its security alert, Oracle said it, "strongly recommends that the fix for this vulnerability be applied as soon as possible." The flaw affects versions 7 and higher of WebLogic.

Intevydis CEO Evgeny Legerov said his company is not following standard industry practice of notifying vendors of the bugs ahead of time because this "allows vendors to exploit security [researchers] to do QA work for free," according to a blog posting.

In an e-mail Friday, Legerov confirmed that Oracle wasn't notified of this particular flaw ahead of time. "Since we have rather limited resources and we are not working for Oracle we are staying away from responsible disclosure path," he said. "It is pretty serious bug," he explained, "a remote attacker could execute OS commands without any authentication."

From CIO: 8 Free Online Courses to Grow Your Tech Skills
Join the discussion
Be the first to comment on this article. Our Commenting Policies