Shutterstock
Oracle has been compelled to issue an out-of-band patch to correct a critical remote code execution (RCE) flaw impacting a number of Oracle WebLogic Server versions.
The vulnerability, tracked as CVE-2020-14750, could help hackers to remotely exploit the server by way of a HTTP GET by the server’s console ingredient, without having any person conversation and might be exploited about a network without having the need to have for a username and password.
Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).
➤ Get Mullvad VPN with 12% Discount
“Thanks to the severity of this vulnerability and the publication of exploit code on various websites, Oracle strongly suggests that buyers apply the updates furnished by this Security Alert as shortly as attainable,” Oracle explained in an https://www.oracle.com/security-alerts/warn-cve-2020-14750.html advisory.
The advisory mentioned that the supported Oracle WebLogic Server variations that are affected by CVE-2020-14750 contain 10.3.6.., 12.1.3.., 12.2.1.3., 12.2.1.4., and 14.1.1…
Proof-of-concept code that could exploit the bug was made general public on GitHub. According to security firm Spyse, all over 3,300 WebLogic servers are uncovered at the second and could be vulnerable to the flaw.
In a web site article, Eric Maurice, director of Security Assurance at Oracle, shared a website link to support customers harden afflicted servers.
He also said that the vulnerability is related to CVE-2020-14882, which was tackled in the October 2020 Critical Patch Update. That particular flaw could help hackers network entry by means of HTTP to realize full compromise and takeover of vulnerable Oracle WebLogic Servers.
The US Cybersecurity and Infrastructure Security Agency (CISA) also warned people about the potential risks of the vulnerability and inspired directors to implement the patch as shortly as possible.
Some components of this write-up are sourced from:
www.itpro.co.uk