// For flags

CVE-2017-3506

Oracle WebLogic Server OS Command Injection Vulnerability

Severity Score

7.4
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

2
*Multiple Sources

Exploited in Wild

Yes
*KEV

Decision

Act
*SSVC
Descriptions

Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: Web Services). Supported versions that are affected are 10.3.6.0, 12.1.3.0, 12.2.1.0, 12.2.1.1 and 12.2.1.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle WebLogic Server accessible data as well as unauthorized access to critical data or complete access to all Oracle WebLogic Server accessible data. CVSS 3.0 Base Score 7.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N).

Vulnerabilidad en el componente Oracle WebLogic Server de Oracle Fusion Middleware (subcomponente: Web Services). Versiones compatibles que son afectadas son 10.3.6.0, 12.1.3.0, 12.2.1.0, 12.2.1.1 y 12.2.1.2. Vulnerabilidad dificil de explotar permite a atacante autenticado con acceso a la red a través de HTTP comprometer Oracle WebLogic Server. Los ataques exitosos de esta vulnerabilidad pueden provocar la creación, eliminación o modificación no autorizada de acceso a datos críticos o todos los datos accesibles de Oracle WebLogic Server, así como el acceso no autorizado a datos críticos o el acceso completo a todos los datos accesibles de Oracle WebLogic Server. CVSS 3.0 Base Score 7.4 (Impactos de confidencialidad e integridad). Vector CVSS: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N).

Oracle WebLogic Server, a product within the Fusion Middleware suite, contains an OS command injection vulnerability that allows an attacker to execute arbitrary code via a specially crafted HTTP request that includes a malicious XML document.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:Act
Exploitation
Active
Automatable
No
Tech. Impact
Total
* Organization's Worst-case Scenario
Timeline
  • 2016-12-06 CVE Reserved
  • 2017-04-24 CVE Published
  • 2019-11-05 First Exploit
  • 2024-06-03 Exploited in Wild
  • 2024-06-24 KEV Due Date
  • 2024-07-04 EPSS Updated
  • 2024-08-05 CVE Updated
CWE
  • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Oracle
Search vendor "Oracle"
Weblogic Server
Search vendor "Oracle" for product "Weblogic Server"
10.3.6.0.0
Search vendor "Oracle" for product "Weblogic Server" and version "10.3.6.0.0"
-
Affected
Oracle
Search vendor "Oracle"
Weblogic Server
Search vendor "Oracle" for product "Weblogic Server"
12.1.3.0.0
Search vendor "Oracle" for product "Weblogic Server" and version "12.1.3.0.0"
-
Affected
Oracle
Search vendor "Oracle"
Weblogic Server
Search vendor "Oracle" for product "Weblogic Server"
12.2.1.0.0
Search vendor "Oracle" for product "Weblogic Server" and version "12.2.1.0.0"
-
Affected
Oracle
Search vendor "Oracle"
Weblogic Server
Search vendor "Oracle" for product "Weblogic Server"
12.2.1.1.0
Search vendor "Oracle" for product "Weblogic Server" and version "12.2.1.1.0"
-
Affected
Oracle
Search vendor "Oracle"
Weblogic Server
Search vendor "Oracle" for product "Weblogic Server"
12.2.1.2.0
Search vendor "Oracle" for product "Weblogic Server" and version "12.2.1.2.0"
-
Affected