跳转到帖子

Oracle WebLogic: CVE-2024-22262 : Critical Patch Update

recommended_posts

发布于
  • Members

Oracle WebLogic: CVE-2024-22262 : Critical Patch Update

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
04/16/2024
Created
07/27/2024
Added
07/25/2024
Modified
07/25/2024

Description

Applications that use UriComponentsBuilder to parse an externally provided URL (e.g. through a query parameter) AND perform validation checks on the host of the parsed URL may be vulnerable to aopen redirect https://cwe.mitre.org/data/definitions/601.html  attack or to a SSRF attack if the URL is used after passing validation checks. This is the same asCVE-2024-22259 https://spring.io/security/cve-2024-22259  andCVE-2024-22243 https://spring.io/security/cve-2024-22243 , but with different input.

Solution(s)

  • oracle-weblogic-jul-2024-cpu-12_2_1_4_0
  • oracle-weblogic-jul-2024-cpu-14_1_1_0_0

References

  • https://attackerkb.com/topics/cve-2024-22262
  • CVE - 2024-22262
  • http://www.oracle.com/security-alerts/cpujul2024.html
  • https://support.oracle.com/rs?type=doc&id=3030266.2
  • 查看数 708
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。
注意:你的帖子需要版主批准后才能看到。

游客
回帖…