10
CVSSv2

CVE-2008-3257

Published: 22/07/2008 Updated: 29/09/2017
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 1000
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Stack-based buffer overflow in the Apache Connector (mod_wl) in Oracle WebLogic Server (formerly BEA WebLogic Server) 10.3 and previous versions allows remote malicious users to execute arbitrary code via a long HTTP version string, as demonstrated by a string after "POST /.jsp" in an HTTP request.

Vulnerable Product Search on Vulmon Subscribe to Product

bea weblogic server 3.1.8

bea weblogic server 4.5.1

bea weblogic server 4.5.2

bea weblogic server 5.1

bea weblogic server 6.1

bea weblogic server 7.0.0.1

bea weblogic server 7.0

bea weblogic server 8.1

bea weblogic server 9.0

bea weblogic server 9.1

bea weblogic server 10.0

bea weblogic server 6.0

bea weblogic server 9.2

bea weblogic server 4.0

bea weblogic server 4.0.4

bea systems apache connector in weblogic server

bea weblogic server 4.5

bea systems weblogic server 10.0_mp1

oracle weblogic server

Exploits

#// Bea Weblogic -- Apache Connector Remote Exploit +-1day #// Should stack break latest Windows Server 2003 <address space randomization> #// BIG THANKS TO #// "dong-hun you"(Xpl017Elz) in INetCop - for his paper #// "Title: Advanced exploitation in exec-shield (Fedora Core case study)" #// His technique works fine against Windows 2003 late ...
## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # web site for more information on licensing and terms of use # metasploitcom/ ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote Rank = GreatRanking HttpFingerprint = { :pat ...

Github Repositories

FortiSIEM Incapsula WAF Parser Custom Why did we create a custom Incapsula WAF for FortiSIEM? Because the latest version of FortiSIEM doesn't support this parser or API yet Furthermore, Common Event Format(CEF) logs that have come to the FortiSIEM will be parsed to the generic CEF instead The structure of the parser <patternDefinitions> <!-- Defi