<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet type="text/xsl" href="2967710.xsl"?>
<?xml-stylesheet type="text/css" href="2967708.css"?>
<cvrf:cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
   <DocumentTitle xml:lang="en">Oracle Security Alert for CVE-2019-2725 - Oracle CVRF</DocumentTitle>
   <DocumentType xml:lang="en">Oracle Security Alert</DocumentType>
   <DocumentPublisher Type="Vendor"/>
   <DocumentTracking>
      <Identification>
         <ID>CVE-2019-2725</ID>
      </Identification>
      <Status>Final</Status>
      <Version>4</Version>
      <RevisionHistory>
         <Revision>
            <Number>4</Number>
            <Date>2019-05-29T11:39:00-07:00</Date>
            <Description>Updated Credit Statement</Description>
         </Revision>
      </RevisionHistory>
      <InitialReleaseDate>2019-04-26T13:00:00-07:00</InitialReleaseDate>
      <CurrentReleaseDate>2019-05-29T11:39:00-07:00</CurrentReleaseDate>
   </DocumentTracking>
   <DocumentNotes>
      <Note Audience="All" Ordinal="1" Title="Summary" Type="Summary" xml:lang="en">This document contains descriptions of Oracle product security vulnerabilities which have had fixes released for all supported versions and platforms for the associated product.  Additional information regarding these vulnerabilities including fix distribution information can be found at the Oracle sites referenced in this document.</Note>
   </DocumentNotes>
   <DocumentDistribution>This document is published at: https://www.oracle.com/ocom/groups/public/@otn/documents/webcontent/5466297.xml</DocumentDistribution>
   <DocumentReferences>
      <Reference Type="External">
         <URL>https://www.oracle.com/security-alerts/alert-cve-2019-2725.html</URL>
         <Description>URL to html version of Advisory</Description>
      </Reference>
   </DocumentReferences>
   <Acknowledgments>
      <Acknowledgment>
         <Name>Badcode</Name>
         <Organization>Knownsec 404 Team</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Hongwei Pan</Name>
         <Organization>Minsheng Banking Corp.</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Icematcha of Qianxin Yunying Labs</Name>
         <Organization></Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Liao Xinxi</Name>
         <Organization>NSFOCUS Security Team</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Lin Zheng</Name>
         <Organization>Minsheng Banking Corp.</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Song Keya</Name>
         <Organization>Minsheng Banking Corp.</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Tianlei Li</Name>
         <Organization>Minsheng Banking Corp.</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Xu Yuanzhen of Alibaba Cloud Security Team</Name>
         <Organization></Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>ZengShuai Hao</Name>
         <Organization>ZengShuai Hao</Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>Zhiyi Zhang from Codesafe Team of Legendsec at Qi'anxin Group</Name>
         <Organization></Organization>
      </Acknowledgment>
      <Acknowledgment>
         <Name>icez</Name>
         <Organization>Tophant Competence Center</Organization>
      </Acknowledgment>
   </Acknowledgments>
   <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
      <Branch Name="Oracle" Type="Vendor">
         <Branch Name="Oracle Fusion Middleware" Type="Product Family">
            <Branch Name="WebLogic Server" Type="Product Name">
               <Branch Name="10.3.6.0" Type="Product Version">
                  <FullProductName ProductID="P-5242V-10.3.6.0">WebLogic Server Version 10.3.6.0</FullProductName>
               </Branch>
               <Branch Name="12.1.3.0" Type="Product Version">
                  <FullProductName ProductID="P-5242V-12.1.3.0">WebLogic Server Version 12.1.3.0</FullProductName>
               </Branch>
            </Branch>
         </Branch>
      </Branch>
   </ProductTree>
   <Vulnerability Ordinal="1" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
      <Title>CVE-2019-2725</Title>
      <Notes>
         <Note Audience="All" Ordinal="1" Title="Details" Type="Details">Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: Web Services).  Supported versions that are affected are 10.3.6.0 and  12.1.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server.  Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).</Note>
      </Notes>
      <Involvements>
         <Involvement Party="Vendor" Status="Completed">
            <Description>Fix has been released</Description>
         </Involvement>
      </Involvements>
      <CVE>CVE-2019-2725</CVE>
      <ProductStatuses>
         <Status Type="Known Affected">
            <ProductID>P-5242V-10.3.6.0</ProductID>
            <ProductID>P-5242V-12.1.3.0</ProductID>
         </Status>
      </ProductStatuses>
      <CVSSScoreSets>
         <ScoreSet>
            <BaseScore>  9.8</BaseScore>
            <Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
         </ScoreSet>
      </CVSSScoreSets>
      <Remediations>
         <Remediation Type="Vendor Fix">
            <Description>CVE-2019-2725</Description>
            <Entitlement xml:lang="en">Oracle customers with valid support contracts</Entitlement>
            <URL>https://www.oracle.com/security-alerts/alert-cve-2019-2725.html</URL>
            <ProductID>P-5242V-10.3.6.0</ProductID>
            <ProductID>P-5242V-12.1.3.0</ProductID>
         </Remediation>
      </Remediations>
   </Vulnerability>
</cvrf:cvrfdoc>
