Oracle released an out-of-band patch for a WebLogic Server Deserialization vulnerability which could allow an unauthenticated attacker to remotely exploit and gain remote code execution (RCE) ability on vulnerable systems.
The vulnerability, CVE-2019-2729, affected Oracle WebLogic Server, versions 10.3.6.0.0, 220.127.116.11.0, and 18.104.22.168.0, and can be exploited over a network without the need for a username and password.
This is the second vulnerability of this type spotted in two months, with the previous flaw announced in April after it was being used in cryptojacking and ransomware campaigns.
Oracle said in a blog post that,while both exploits are deserialization flaws, CVE-2019-2729 is “a distinct vulnerability.”
In 2017 a similar vulnerability was exploited to install Bitcoin miners. Oracle recommends those who are impacted apply the updates as soon as possible due to the severity of the vulnerability.