UDDIs are back? Attackers rediscovering old exploits., (Tue, Apr 18th)

Denial-of-service attack
Denial-of-service attack

Looking at our “first seen URLs” today, I noticed the following odd request:


UDDIs are a concept that had great promise but never quite made it. I would consider it dead at this point, but I wouldn’t be surprised to find it in some enterprise systems. A “UDDI” (Universal Description, Discovery, and Integration) is a directory of web services. The idea behind is to automatically find web services belonging to an organization, including the associated documentation (WSDLs), to more or less automate the creation of clients for these web services. It was kind of a neat concept that never lived up to its promise.

This URL suddenly appears quite popular, with 1,446 scans today. In the past, we have seen occasional scans for similar “uddiexplorer” URLs. This time, the only IP scanning for them is %%ip: It appears to be a “random” Chinese ADSL IP address that only scans port 7001, a port typically assigned to WebLogic.

Back then, WebLogic suffered from an easily exploitable SSRF vulnerability, %%cve:2014-4210%%. The almost ten-year-old vulnerability still appears to be attracting some attacks. Some attacks still appear to find this an attractive target. But the short lifetime of each scan likely shows that these scans are not successful.

We had small scans, with less than a dozen reports from our sensors, on March 1st and February. The “interesting part” is the “operator” parameter, which is the URL the attacker is trying to hit via SSRF. For example:


is an attempt to detect exploitability via OAST.

The graph below shows recent attempts containing the string “uddiexplorer”:

graph of daily reports for URLs containing /uddiexplorer/

Johannes B. Ullrich, Ph.D. , Dean of Research, SANS.edu

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

Reposted from SANS. View original.

Alex Post