Description
T3 is a special RMI protocol implemented in Weblogic. It's vulnerable to an XML extenal entity injection. An attacker can send crafted requests to a web application for extraction of secrets from the file system, server-side request forgery or denial-of-service attacks.
Remediation
Upgrade to the latest version of Oracle WebLogic Server. This issue was fixed in Oracle Critical Patch Update - April 2019. Or disable/restrict access to T3
References
Related Vulnerabilities
WordPress Plugin Simple Ads Manager Denial of Service (2.9.3.114)
WordPress Plugin Safe SVG Denial of Service (1.9.4)
Server-Side Request Forgery (localhost)
WordPress Plugin Dropbox Folder Share Server-Side Request Forgery (1.9.7)
WordPress Plugin Like Button Rating-LikeBtn Server-Side Request Forgery (2.6.31)