Arbitrary Command Execution via Serialized Java Object in Oracle WebLogic Server T3 Protocol Traffic

Arbitrary Command Execution via Serialized Java Object in Oracle WebLogic Server T3 Protocol Traffic

CVE-2015-4852 · CRITICAL Severity

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

The WLS Security component in Oracle WebLogic Server 10.3.6.0, 12.1.2.0, 12.1.3.0, and 12.2.1.0 allows remote attackers to execute arbitrary commands via a crafted serialized Java object in T3 protocol traffic to TCP port 7001, related to oracle_common/modules/com.bea.core.apache.commons.collections.jar. NOTE: the scope of this CVE is limited to the WebLogic Server product.

Learn more about our Cis Benchmark Audit For Apache Http Server.