| Description: | | Oracle WebLogic Server’s proprietary T3 protocol is designed for internal RMI communication between server instances. Attackers who can reach the T3 port can embed malicious serialized Java objects inside the protocol stream. When the server deserializes these objects during its normal RMI handshake, it may instantiate attacker-supplied classes that execute arbitrary code in the JVM security context of the WebLogic process. Successful exploitation grants the adversary operating-system privileges equal to the WebLogic service account, enabling complete takeover of the middleware host, lateral movement into backend databases, and the ability to tamper with or shut down business applications that rely on the WebLogic tier. |