Oracle WebLogic Server OS Command Injection Flaw Under Active Attack

Please wait 0 seconds...
Scroll Down and click on Go to Link for destination
Congrats! Link is Generated

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a security issue affecting the Oracle WebLogic Server to the Known Exploited Vulnerabilities (KEV) database, citing indications of ongoing exploitation.

Tracked as CVE-2017-3506 (CVSS score: 7.4), the problem involves an operating system (OS) command injection vulnerability that might be exploited to get unauthorized access to sensitive servers and assume total control.

"Oracle WebLogic Server, a product within the Fusion Middleware suite, contains an OS command injection vulnerability that allows an attacker to execute arbitrary code via a specially crafted HTTP request that includes a malicious XML document," CISA warned.

While the agency did not specify the kind of attacks using the vulnerability, the China-based cryptojacking gang known as the 8220 Gang (aka Water Sigbin) has a history of leveraging it since early last year to co-opt unpatched devices into a crypto-mining botnet.

According to a recent report published by Trend Micro, the 8220 Gang has been observed weaponizing flaws in the Oracle WebLogic server (CVE-2017-3506 and CVE-2023-21839) to launch a cryptocurrency miner filelessly in memory by means of a shell or PowerShell script depending on the operating system targeted.

"The gang employed obfuscation techniques, such as hexadecimal encoding of URLs and using HTTP over port 443, allowing for stealthy payload delivery," security researcher Sunil Bharti stated. "The PowerShell script and the resulting batch file involved complex encoding, using environment variables to hide malicious code within seemingly benign script components."

In view of the current exploitation of CVE-2024-1086 and CVE-2024-24919, government agencies are encouraged to implement the latest updates before June 24, 2024, to secure their networks against possible threats.

Go to Link
Cookie Consent
We serve cookies on this site to analyze traffic, remember your preferences, and optimize your experience.
Oops!
It seems there is something wrong with your internet connection. Please connect to the internet and start browsing again.
Site is Blocked
Sorry! This site is not available in your country.