Vulnerability Details : CVE-2008-3257
Public exploit exists!
Stack-based buffer overflow in the Apache Connector (mod_wl) in Oracle WebLogic Server (formerly BEA WebLogic Server) 10.3 and earlier allows remote attackers to execute arbitrary code via a long HTTP version string, as demonstrated by a string after "POST /.jsp" in an HTTP request.
Vulnerability category: OverflowExecute code
Products affected by CVE-2008-3257
- cpe:2.3:a:oracle:weblogic_server:*:*:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:4.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:3.1.8:*:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:4.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:5.1:*:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:4.0:*:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:4.5:*:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:5.1:sp1:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:5.1:sp5:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:5.1:sp2:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:5.1:sp6:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:5.1:sp4:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:5.1:sp3:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:6.1:*:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:6.1:sp1:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:6.0:*:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:6.0:sp1:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:6.0:sp2:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:5.1:sp10:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:5.1:sp12:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:5.1:sp8:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:5.1:sp9:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:6.1:sp3:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:5.1:sp7:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:6.1:sp2:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:7.0.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:7.0:*:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:7.0.0.1:sp2:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:7.0:sp2:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:6.1:sp4:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:7.0:sp1:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:7.0.0.1:sp1:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:7.0:sp3:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:7.0.0.1:sp4:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:8.1:sp3:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:6.1:sp6:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:7.0.0.1:sp3:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:6.1:sp5:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:7.0:sp5:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:8.1:sp2:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:7.0:sp4:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:8.1:sp1:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:8.1:sp4:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:8.1:*:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:5.1:sp11:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:5.1:sp13:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:7.0:sp6:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:6.1:sp7:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:7.0:sp7:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:8.1:sp5:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:6.1:sp8:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:9.0:*:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:9.0:sp2:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:9.0:sp1:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:9.0:sp5:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:9.0:sp3:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:9.0:sp4:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:6.0:sp6:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:9.1:*:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:9.0:ga:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:9.1:ga:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:9.2:*:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:8.1:sp6:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:10.0:*:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:9.2:mp1:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:9.2:mp2:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:4.5.1:sp15:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:4.5.2:*:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:4.5.2:sp1:*:*:*:*:*:*
- cpe:2.3:a:bea:weblogic_server:4.5.2:sp2:*:*:*:*:*:*
- cpe:2.3:a:bea_systems:weblogic_server:10.0_mp1:*:*:*:*:*:*:*
- cpe:2.3:a:bea_systems:apache_connector_in_weblogic_server:*:*:*:*:*:*:*:*
Threat overview for CVE-2008-3257
Top countries where our scanners detected CVE-2008-3257
Top open port discovered on systems with this issue
80
IPs affected by CVE-2008-3257 2
Find out if you* are
affected by CVE-2008-3257!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2008-3257
94.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 99 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2008-3257
-
Oracle Weblogic Apache Connector POST Request Buffer Overflow
Disclosure Date: 2008-07-17First seen: 2020-04-26exploit/windows/http/bea_weblogic_post_bofThis module exploits a stack based buffer overflow in the BEA Weblogic Apache plugin. The connector fails to properly handle specially crafted HTTP POST requests, resulting a buffer overflow due to the insecure usage of sprintf. Currently, this module wor
CVSS scores for CVE-2008-3257
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST |
CWE ids for CVE-2008-3257
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
Vendor statements for CVE-2008-3257
-
Oracle 2008-07-31Oracle has released a workaround for CVE-2008-3257. Information is available at: http://www.oracle.com/technology/deploy/security/alerts/alert_cve2008-3257.html
References for CVE-2008-3257
-
https://support.bea.com/application_content/product_portlets/securityadvisories/2793.html
-
http://www.attrition.org/pipermail/vim/2008-July/002035.html
-
http://www.securitytracker.com/id?1020520
-
http://www.attrition.org/pipermail/vim/2008-July/002036.html
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/43885
-
http://www.kb.cert.org/vuls/id/716387
US Government Resource
-
https://www.exploit-db.com/exploits/6089
-
http://www.securityfocus.com/bid/30273
Oracle mod_wl HTTP POST Request Remote Buffer Overflow Vulnerability
-
http://blogs.oracle.com/security/2008/07/security_alert_for_cve-2008-3257_released.html
-
http://www.vupen.com/english/advisories/2008/2145/references
-
http://www.oracle.com/technology/deploy/security/alerts/alert_cve2008-3257.html
Jump to