← Retour aux CVEs
CVE-2019-2725
CRITICALCISA KEV9.8
Description
Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: Web Services). Supported versions that are affected are 10.3.6.0.0 and 12.1.3.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
Details CVE
Score CVSS v3.19.8
SeveriteCRITICAL
Vecteur CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vecteur d'attaqueNETWORK
ComplexiteLOW
Privileges requisNONE
Interaction utilisateurNONE
Publie4/26/2019
Derniere modification10/27/2025
Sourcekev
Observations honeypot0
CISA KEV
FournisseurOracle
ProduitWebLogic Server
Nom vulnerabiliteOracle WebLogic Server, Injection
Date ajout KEV2022-01-10
Date limite remediation2022-07-10
Utilise dans ransomwareKnown
Produits affectes
oracle:agile_plmoracle:communications_converged_application_serveroracle:peoplesoft_enterprise_peopletoolsoracle:storagetek_tape_analytics_sw_tooloracle:tape_library_acslsoracle:tape_virtual_storage_manager_guioracle:vm_virtualboxoracle:weblogic_server
Faiblesses (CWE)
CWE-74
References
http://packetstormsecurity.com/files/152756/Oracle-Weblogic-Server-Deserialization-Remote-Code-Execution.html(secalert_us@oracle.com)
http://www.oracle.com/technetwork/security-advisory/alert-cve-2019-2725-5466295.html(secalert_us@oracle.com)
http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html(secalert_us@oracle.com)
http://www.securityfocus.com/bid/108074(secalert_us@oracle.com)
https://support.f5.com/csp/article/K90059138(secalert_us@oracle.com)
https://www.exploit-db.com/exploits/46780/(secalert_us@oracle.com)
https://www.oracle.com/security-alerts/alert-cve-2019-2725.html#AppendixFMW(secalert_us@oracle.com)
https://www.oracle.com/security-alerts/cpujan2020.html(secalert_us@oracle.com)
http://packetstormsecurity.com/files/152756/Oracle-Weblogic-Server-Deserialization-Remote-Code-Execution.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.oracle.com/technetwork/security-advisory/alert-cve-2019-2725-5466295.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/108074(af854a3a-2127-422b-91ae-364da2661108)
https://support.f5.com/csp/article/K90059138(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/46780/(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/alert-cve-2019-2725.html#AppendixFMW(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpujan2020.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2019-2725(134c704f-9b21-4f2e-91b3-4a467353bcc0)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.