Several application running Oracle WebLogic were detected by Nessus as having a vulnerable version (being exploited in the wild).
Impacted Versions: WebLogic 10.X, WebLogic 12.1.3
Oracle is working on the fix, below is the work around for the time being.
To prevent attacks, KnownSec 404 is recommending that companies either remove the vulnerable components and
restart their WebLogic servers, or put firewall rules in place to prevent requests being made to two URL
paths exploited by the attacks ( /_async/* and /wls-wsat/*).
Remove below 2 wars form installation and bounce the JVM’s with server tmp clean.
Update – Oracle has released the Patches
Jan PSU 10.3.6.0.190115 Patch 28710912 + Overlay Patch 29694149 on 10.3.6.0.190115 for CVE-2019-2725
Apr PSU 10.3.6.0.190416 Patch 29204678 + Overlay Patch 29694149 on 10.3.6.0.190416 for CVE-2019-2725
Jan 2019 PSU 184.108.40.206.190115 Patch 28710923 + Overlay Patch 29694149 on 220.127.116.11.190115 for CVE-2019-2725
Apr 2019 PSU 18.104.22.168.190416 Patch 29204657 + Overlay Patch 29694149 on 22.214.171.124.190416 for CVE-2019-2725