{"id":22702,"date":"2018-05-03T15:59:12","date_gmt":"2018-05-03T13:59:12","guid":{"rendered":"https:\/\/pitss.org\/de\/?p=22702"},"modified":"2018-06-12T11:05:30","modified_gmt":"2018-06-12T09:05:30","slug":"oracle-weblogic-server-cve-2018-2628","status":"publish","type":"post","link":"https:\/\/pitss.org\/de\/oracle-weblogic-server-cve-2018-2628\/","title":{"rendered":"Oracle WebLogic Server in Gefahr! So verhindern Sie Schlimmeres"},"content":{"rendered":"<p>[et_pb_section bb_built=&#8220;1&#8243; fullwidth=&#8220;on&#8220; _builder_version=&#8220;3.0.74&#8243; background_image=&#8220;https:\/\/pitss.org\/de\/wp-content\/uploads\/sites\/9\/2017\/08\/blog-2-header-v3-min.jpg&#8220; next_background_color=&#8220;#ffffff&#8220;][et_pb_fullwidth_header title=&#8220;PITSS Tech Blog&#8220; subhead=&#8220;News zu Java, PL\/SQL, Entwicklung &amp; Technologiewechsel&#8220; background_layout=&#8220;dark&#8220; text_orientation=&#8220;center&#8220; background_overlay_color=&#8220;rgba(0,0,0,0.53)&#8220; _builder_version=&#8220;3.2.1&#8243; title_font_size=&#8220;36px&#8220; subhead_font_size=&#8220;22px&#8220; max_width_tablet=&#8220;50px&#8220; background_color=&#8220;rgba(255, 255, 255, 0)&#8220;]<\/p>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_fullwidth_header][\/et_pb_section][et_pb_section bb_built=&#8220;1&#8243; specialty=&#8220;on&#8220; background_position_1=&#8220;top_left&#8220; background_position_2=&#8220;top_left&#8220; background_repeat_1=&#8220;no-repeat&#8220; background_repeat_2=&#8220;no-repeat&#8220; _builder_version=&#8220;3.0.69&#8243; prev_background_color=&#8220;#000000&#8243; next_background_color=&#8220;#000000&#8243;][et_pb_column type=&#8220;3_4&#8243; specialty_columns=&#8220;3&#8243;][et_pb_row_inner admin_label=&#8220;Row&#8220; custom_padding=&#8220;29.6833px|0px|0|0px&#8220; _builder_version=&#8220;3.0.69&#8243;][et_pb_column_inner type=&#8220;4_4&#8243; saved_specialty_column_type=&#8220;3_4&#8243;][et_pb_text _builder_version=&#8220;3.2.1&#8243; module_alignment=&#8220;left&#8220; background_layout=&#8220;light&#8220;]<\/p>\n<h1>Oracle WebLogic Server in Gefahr! So verhindern Sie Schlimmeres<\/h1>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_text][et_pb_team_member _builder_version=&#8220;3.2.1&#8243; name=&#8220;by Stephan La Rocca&#8220; position=&#8220;Business Development, PITSS GmbH&#8220; twitter_url=&#8220;https:\/\/twitter.com\/StephanLaRocca&#8220; image_url=&#8220;https:\/\/pitss.org\/de\/wp-content\/uploads\/sites\/9\/2018\/05\/stephanlarocca.jpg&#8220; header_font_size=&#8220;16&#8243; max_width=&#8220;50%&#8220; \/][et_pb_text _builder_version=&#8220;3.2.1&#8243; module_alignment=&#8220;left&#8220;]<\/p>\n<p><strong>Die amerikanische <a href=\"https:\/\/greynoise.io\/\">IT Security Firma Greynoise<\/a> berichtet aktuell von stark erh\u00f6hten Scanning Aktivit\u00e4ten nach verwundbaren WebLogic Servern. F\u00fcr diese stehen zwar schon Updates bereit, welche aber von den Angreifern offenbar bereits umgangen werden k\u00f6nnen, da die Updates nicht das Kern des Problems beheben. Besonders kritisch scheint die Schwachstelle mit der Kennung CVE-2018-2628 zu sein.<\/strong><\/p>\n<p>[\/et_pb_text][et_pb_image src=&#8220;https:\/\/pitss.org\/de\/wp-content\/uploads\/sites\/9\/2018\/05\/Post_greynoise.png&#8220; _builder_version=&#8220;3.2.1&#8243; show_in_lightbox=&#8220;on&#8220;]<\/p>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_image][et_pb_text _builder_version=&#8220;3.2.1&#8243; module_alignment=&#8220;left&#8220;]<\/p>\n<h2>Schwachstelle schlie\u00dfen und TCP-Port 7001 blockieren<\/h2>\n<p>Wer Oracle WebLogic Server nutzt, sollte entsprechend unbedingt aktiv werden. Zum einen ist schnellstm\u00f6glich die aktuellste Version zu installieren. Das allein scheint aber nicht auszureichen. Der Sicherheitsforscher <a href=\"https:\/\/twitter.com\/GossiTheDog\">Kevin Beaumant<\/a> warnt, dass mit dem aktuellsten Patch nicht die eigentliche Sicherheitsl\u00fccke geschlossen, sondern lediglich bestimmte Befehle auf die Blacklist gesetzt wurden. Daher ist es wichtig, zus\u00e4tzlich den TCP-Port 7001 zu blockieren um keine externen Zugriffe zu erm\u00f6glichen.<\/p>\n<p>[\/et_pb_text][et_pb_image src=&#8220;https:\/\/pitss.org\/de\/wp-content\/uploads\/sites\/9\/2018\/05\/post_kevinbreaumont.png&#8220; _builder_version=&#8220;3.2.1&#8243; show_in_lightbox=&#8220;on&#8220;]<\/p>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_image][\/et_pb_column_inner][\/et_pb_row_inner][\/et_pb_column][et_pb_column type=&#8220;1_4&#8243;][et_pb_search exclude_pages=&#8220;on&#8220; exclude_posts=&#8220;off&#8220; include_categories=&#8220;118,189,147,199,19,173,175,176,5,112,180,18,150,141,153,142,200,144,190,80,185,177,137,159,96,161,99,113,191,192,201,25,162,202,203,82,97,105,106,151,107,108,194,193,156,186,154,121,100,3,69,148,195,85,131,170,115,86,160,87,145,117,196,114,138,2,133,83,164,165,98,143,139,109,157,166,110,158,111,102,167,155,168,197,163,84,101,4,171,204,140,116,178,174,136,187,179,103,1,198,172,152,169,188,91,104,92,149&#8243; placeholder=&#8220;Artikel suchen&#8220; button_color=&#8220;#006bb3&#8243; _builder_version=&#8220;3.0.74&#8243; button_text_color=&#8220;#ffffff&#8220; module_alignment=&#8220;left&#8220; hide_button=&#8220;off&#8220;]<\/p>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_search][et_pb_sidebar orientation=&#8220;right&#8220; area=&#8220;et_pb_widget_area_1&#8243; _builder_version=&#8220;3.0.74&#8243;]<\/p>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_sidebar][et_pb_button button_url=&#8220;https:\/\/pitss.org\/de\/techblog&#8220; button_text=&#8220;\u2191 Zur\u00fcck zur \u00dcbersicht&#8220; button_alignment=&#8220;center&#8220; _builder_version=&#8220;3.0.74&#8243; custom_button=&#8220;on&#8220; button_text_size=&#8220;16&#8243; button_text_color=&#8220;#9b9b9b&#8220; button_border_color=&#8220;#d2d2d2&#8243; button_letter_spacing=&#8220;0&#8243;]<\/p>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_button][\/et_pb_column][\/et_pb_section][et_pb_section bb_built=&#8220;1&#8243; _builder_version=&#8220;3.0.47&#8243; prev_background_color=&#8220;#000000&#8243;][et_pb_row _builder_version=&#8220;3.0.47&#8243; background_size=&#8220;initial&#8220; background_position=&#8220;top_left&#8220; background_repeat=&#8220;repeat&#8220;][et_pb_column type=&#8220;4_4&#8243;][et_pb_comments _builder_version=&#8220;3.0.106&#8243; show_avatar=&#8220;on&#8220; show_reply=&#8220;on&#8220; show_count=&#8220;off&#8220; background_layout=&#8220;light&#8220; header_font_size_tablet=&#8220;51&#8243; header_line_height_tablet=&#8220;2&#8243; custom_button=&#8220;off&#8220; button_icon_placement=&#8220;right&#8220;]<\/p>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_comments][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; Oracle WebLogic Server in Gefahr! So verhindern Sie Schlimmeres &nbsp; Die amerikanische IT Security Firma Greynoise berichtet aktuell von stark erh\u00f6hten Scanning Aktivit\u00e4ten nach verwundbaren WebLogic Servern. F\u00fcr diese stehen zwar schon Updates bereit, welche aber von den Angreifern offenbar bereits umgangen werden k\u00f6nnen, da die Updates nicht das Kern des Problems beheben. Besonders kritisch scheint die Schwachstelle mit der Kennung CVE-2018-2628 [&hellip;]<\/p>\n","protected":false},"author":44,"featured_media":22701,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[3,81],"tags":[287,66,285,286],"class_list":["post-22702","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-home-page-featured","category-tech-blog","tag-it-security","tag-oracle","tag-oracle-wls","tag-weblogic-server"],"_links":{"self":[{"href":"https:\/\/pitss.org\/de\/wp-json\/wp\/v2\/posts\/22702","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pitss.org\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pitss.org\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pitss.org\/de\/wp-json\/wp\/v2\/users\/44"}],"replies":[{"embeddable":true,"href":"https:\/\/pitss.org\/de\/wp-json\/wp\/v2\/comments?post=22702"}],"version-history":[{"count":10,"href":"https:\/\/pitss.org\/de\/wp-json\/wp\/v2\/posts\/22702\/revisions"}],"predecessor-version":[{"id":22716,"href":"https:\/\/pitss.org\/de\/wp-json\/wp\/v2\/posts\/22702\/revisions\/22716"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pitss.org\/de\/wp-json\/wp\/v2\/media\/22701"}],"wp:attachment":[{"href":"https:\/\/pitss.org\/de\/wp-json\/wp\/v2\/media?parent=22702"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pitss.org\/de\/wp-json\/wp\/v2\/categories?post=22702"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pitss.org\/de\/wp-json\/wp\/v2\/tags?post=22702"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}