Researchers expose vulnerabilities in Oracle’s Java Cloud Service

A security researcher has published technical details and attack code for dozens of security flaws claimed to affect Oracle’s Java Cloud Service, including some that could allow an attacker to remotely attack apps hosted in its data centers. Security Explorations, a Poland-based company headed up by Java security specialist Adam Gowdiak, has spilled the beans on 30 flaws it says affect customers of Oracle’s Java Cloud at its US and EMEA region datacentres. 

Researchers have released technical details and attack code for 30 security issues affecting Oracle’s Java Cloud Service. Some of the issues make it possible for attackers to read or modify users’ sensitive data or to execute malicious code, the researchers warned. Poland-based Security Explorations typically withholds such public airings until after any vulnerabilities have been fixed to prevent them from being exploited maliciously. The researchers broke from that tradition this week after Oracle representatives failed to resolve issues including bypasses of the Java security sandbox, bypasses of Java whitelisting rules, the use of shared WebLogic server administrator passwords, and the availability of plain-text use passwords stored in some systems.

What do you think?

Avatar of Michio Hasai

Written by Michio Hasai

Michio Hasai is a social strategist and car guy. Find him on Facebook, Twitter, and Pinterest.

Leave a Reply

Your email address will not be published. Required fields are marked *

GIPHY App Key not set. Please check settings

Juniper Networks to lay off about 6% of its workforce

Skype will soon receive video call upgrades and Cortana integration