Weblogic Remote Command Execution Vulnerability
As per the FoundStone Inc. advisory on this topic which is attached in full later in this entry:
" Assume that there is an application on the WebLogic server that writes user entered data to a file called "temp.txt".
Given below is JHTML/JSP code that will print "Hello World":
<java>out.println("Hello World");</java> (JHTML) -or-
<% out.println("Hello World"); %> (JSP)
If this code is somehow inserted in the file "temp.txt" via an application, then the following can be used to invoke forced compilation and execution of "temp.txt":