Security researchers from Security Explorations have been analyzing Oracle’s Java Cloud Service. Based on their findings, experts have determined that Oracle hasn’t done a proper security review of the platform before launching it.
Adam Gowdiak, the CEO of Security Explorations, has revealed that they’ve identified a total of 28 issues. 16 of them can be leveraged to “completely break Java security sandbox of a target WebLogic server environment.”
“An attacker can further leverage this to gain access to application deployments of other users of Oracle Java Cloud service in the same regional data center,” Gowdiak said.
The expert has told Softpedia that some of these vulnerabilities are independent of each other, while others need to be combined in order to work.
“The vulnerabilities were tested in two Oracle Java Cloud data centers (US1 and EMEA1 respectively). They were verified to be present in ver. 13.1 and 13.2 (most recent) of Oracle Java Cloud Software,” Gowdiak explained in a mailed statement.
The nature of the security holes identified by researchers shows that Oracle hasn’t put too much effort into securing the Java Cloud Service.
“They illustrate known and widely discussed security risks related to Java. They also expose weak understanding of Java security model and attack techniques by Oracle engineers,” he said.
Security Explorations has notified Oracle regarding their findings and provided the company with source and binary codes. Tools that illustrate the vulnerabilities and attack scenarios have also been sent. However, Gowdiak says they haven’t received any feedback – Oracle hasn’t yet confirmed receiving the report.
“We hope the next time Larry Ellison is about to choose between boats and work, work is gonna win as obviously certain areas at Oracle need actual work, not the improvisation,” he concluded.