Vulnerabilities found in Oracle Java Cloud Service

According to IDG, “Security researchers released technical details and proof-of-concept code for 30 security issues affecting Oracle’s Java Cloud Service, some of which could allow attackers to compromise business-critical Java applications deployed on it.”

Researchers from Security Explorations, a Polish security firm, publicly disclosed the Java Cloud Service security weaknesses because they weren’t satisfied with how Oracle handled their private report.

“The reported issues include bypasses of the Java security sandbox, bypasses of the Java API whitelisting rules, the use of shared WebLogic server administrator passwords, the availability of security-sensitive plaintext user passwords in Policy Store, the use of outdated Java SE software on the service that was lacking around 150 security fixes, and issues that enable a remote code execution attack against a WebLogic server instance used by other Oracle Java Cloud users.”

I suspect that Oracle is having kittens over this one.  They were a late entry into the cloud computing marketplace, and their big enterprise customer base is sensitive about security issues.  However, providers have to deal with this kind of stuff very quickly and document all aspects of the problem, and the fix.  Ignoring the problem won’t make it go away, and a dismissive attitude won’t bring much customer confidence.

Relevant Analyst
DavidLinthicu-99C-low-resolutionb92ed5a7c89d25d0a624ea3bca538cdf-avatar2

David S. Linthicum

SVP Cloud Technology Partners

Do you want to speak with David S. Linthicum about this topic?

Learn More
You must be logged in to post a comment.
No Comments Subscribers to comment
Explore Related Topics

Latest Research

Latest Webinars

Want to conduct your own Webinar?
Learn More

Learn about our services or Contact us: Email / 800-906-8098