Critical Vulnerability in WebLogic Plug-In for Apache

Oracle issued an advisory regarding a critical security problem in its WebLogic Server. If you're using the platform, then you need to implement a workaround to gain the necessary protection.

You can either configure the server's LimitRequestLine parameter to 4,000 since you probably won't need to use URLs that are longer than 4,000 bytes. Or, you can integrate mod_security for defense. The former is easier of course since mod_security is relatively complex. But for better all-around protection mod_security is the obvious solution.

Hide comments


  • Allowed HTML tags: <em> <strong> <blockquote> <br> <p>

Plain text

  • No HTML tags allowed.
  • Web page addresses and e-mail addresses turn into links automatically.
  • Lines and paragraphs break automatically.