Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2008-3257Improper Restriction of Operations within the Bounds of a Memory Buffer in Oracle Weblogic Server

Severity
10.0CRITICALNVD
EPSS
80.8%
top 0.86%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedJul 22
Latest updateMay 1

Description

Stack-based buffer overflow in the Apache Connector (mod_wl) in Oracle WebLogic Server (formerly BEA WebLogic Server) 10.3 and earlier allows remote attackers to execute arbitrary code via a long HTTP version string, as demonstrated by a string after "POST /.jsp" in an HTTP request.

CVSS vector

AV:N/AC:L/C:C/I:C/A:CExploitability: 10.0 | Impact: 10.0

Affected Packages3 packages

🔴Vulnerability Details

2
GHSA
GHSA-g7f8-j599-7426: Stack-based buffer overflow in the Apache Connector (mod_wl) in Oracle WebLogic Server (formerly BEA WebLogic Server) 102022-05-01
CVEList
CVE-2008-3257: Stack-based buffer overflow in the Apache Connector (mod_wl) in Oracle WebLogic Server (formerly BEA WebLogic Server) 102008-07-22

💥Exploits & PoCs

2
Exploit-DB
Oracle Weblogic Apache Connector - POST Buffer Overflow (Metasploit)2012-05-19
Exploit-DB
Bea Weblogic Apache Connector - Code Execution / Denial of Service2008-07-17
CVE-2008-3257 — Oracle Weblogic Server vulnerability | cvebase