Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

This site is deprecated. Please CLICK HERE for latest updates

Short Name

APP:ORACLE:WEBLOGIC-SRV-RCE-1

Severity

Major

Recommended

No

Recommended Action

Drop

Category

APP

Keywords

Oracle WebLogic Server Commons-Collections Library Insecure Deserialization (1)

Release Date

2016/09/08

Update Number

2776

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+

APP: Oracle WebLogic Server Commons-Collections Library Insecure Deserialization (1)


This signature detects attempts to exploit a known vulnerability against Oracle WebLogic Server. A successful attack can lead to arbitrary code execution.

Extended Description

The MethodClosure class in runtime/MethodClosure.java in Apache Groovy 1.7.0 through 2.4.3 allows remote attackers to execute arbitrary code or cause a denial of service via a crafted serialized object.

Affected Products

  • Apache groovy 1.7.0
  • Apache groovy 1.7.1
  • Apache groovy 1.7.10
  • Apache groovy 1.7.11
  • Apache groovy 1.7.2
  • Apache groovy 1.7.3
  • Apache groovy 1.7.4
  • Apache groovy 1.7.5
  • Apache groovy 1.7.6
  • Apache groovy 1.7.7
  • Apache groovy 1.7.8
  • Apache groovy 1.7.9
  • Apache groovy 1.8.0
  • Apache groovy 1.8.1
  • Apache groovy 1.8.2
  • Apache groovy 1.8.3
  • Apache groovy 1.8.4
  • Apache groovy 1.8.5
  • Apache groovy 1.8.6
  • Apache groovy 1.8.7
  • Apache groovy 1.8.8
  • Apache groovy 1.8.9
  • Apache groovy 1.9.0
  • Apache groovy 2.0.0
  • Apache groovy 2.0.1
  • Apache groovy 2.0.2
  • Apache groovy 2.0.3
  • Apache groovy 2.0.4
  • Apache groovy 2.0.5
  • Apache groovy 2.0.6
  • Apache groovy 2.0.7
  • Apache groovy 2.0.8
  • Apache groovy 2.1.0
  • Apache groovy 2.1.1
  • Apache groovy 2.1.2
  • Apache groovy 2.1.3
  • Apache groovy 2.1.4
  • Apache groovy 2.1.5
  • Apache groovy 2.1.6
  • Apache groovy 2.1.7
  • Apache groovy 2.1.8
  • Apache groovy 2.1.9
  • Apache groovy 2.2.0
  • Apache groovy 2.2.1
  • Apache groovy 2.2.2
  • Apache groovy 2.3.0
  • Apache groovy 2.3.1
  • Apache groovy 2.3.10
  • Apache groovy 2.3.11
  • Apache groovy 2.3.2
  • Apache groovy 2.3.3
  • Apache groovy 2.3.4
  • Apache groovy 2.3.5
  • Apache groovy 2.3.6
  • Apache groovy 2.3.7
  • Apache groovy 2.3.8
  • Apache groovy 2.3.9
  • Apache groovy 2.4.0
  • Apache groovy 2.4.1
  • Apache groovy 2.4.2
  • Apache groovy 2.4.3
  • Oracle health_sciences_clinical_development_center 3.1.1
  • Oracle health_sciences_clinical_development_center 3.1.2
  • Oracle retail_order_broker_cloud_service 15.0
  • Oracle retail_order_broker_cloud_service 4.1
  • Oracle retail_order_broker_cloud_service 5.1
  • Oracle retail_order_broker_cloud_service 5.2
  • Oracle retail_service_backbone 13.0
  • Oracle retail_service_backbone 13.1
  • Oracle retail_service_backbone 13.2
  • Oracle retail_service_backbone 14.0
  • Oracle retail_service_backbone 14.1
  • Oracle retail_service_backbone 15.0
  • Oracle retail_store_inventory_management 13.2
  • Oracle retail_store_inventory_management 14.0
  • Oracle retail_store_inventory_management 14.1
  • Oracle webcenter_sites 11.1.1.8.0
  • Oracle webcenter_sites 12.2.1

References

  • BugTraq: 77539
  • CVE: CVE-2015-3253
  • CVE: CVE-2015-8103
  • CVE: CVE-2016-3642
  • CVE: CVE-2020-2883
  • CVE: CVE-2015-4852
  • CVE: CVE-2015-7450
  • URL: https://www.zerodayinitiative.com/advisories/ZDI-20-504/
  • URL: https://www.zerodayinitiative.com/advisories/ZDI-20-570/

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out