Entreprise d'experts en Sécurité Informatique : Audits et conseils en cybersécurité
Entreprise française de cybersécurité depuis 2004
☎ 03 60 47 09 81 - info@securiteinfo.com


CVE-2019-2725

Description

Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: Web Services). Supported versions that are affected are 10.3.6.0.0 and 12.1.3.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

POC

Reference

- http://packetstormsecurity.com/files/152756/Oracle-Weblogic-Server-Deserialization-Remote-Code-Execution.html

- http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html

- https://www.exploit-db.com/exploits/46780/

- https://www.oracle.com/security-alerts/cpujan2020.html

Github

- https://github.com/0day404/vulnerability-poc

- https://github.com/0day666/Vulnerability-verification

- https://github.com/0ps/pocassistdb

- https://github.com/0xMrNiko/Awesome-Red-Teaming

- https://github.com/0xPThree/WebLogic

- https://github.com/0xT11/CVE-POC

- https://github.com/0xn0ne/weblogicScanner

- https://github.com/1120362990/vulnerability-list

- https://github.com/189569400/Meppo

- https://github.com/20142995/pocsuite

- https://github.com/20142995/pocsuite3

- https://github.com/20142995/sectool

- https://github.com/404notf0und/Security-Data-Analysis-and-Visualization

- https://github.com/4ra1n/poc-runner

- https://github.com/ARPSyndicate/cve-scores

- https://github.com/ARPSyndicate/cvemon

- https://github.com/ARPSyndicate/kenzer-templates

- https://github.com/AdeliaNitzsche/Java-Deserialization-Cheat-Sheet

- https://github.com/Advisory-Newsletter/REvil-

- https://github.com/Amar224/Pentest-Tools

- https://github.com/AnonVulc/Pentest-Tools

- https://github.com/ArrestX/--POC

- https://github.com/BitTheByte/Eagle

- https://github.com/BrittanyKuhn/javascript-tutorial

- https://github.com/Bywalks/WeblogicScan

- https://github.com/CLincat/vulcat

- https://github.com/CVCLabs/cve-2019-2725

- https://github.com/CVEDB/PoC-List

- https://github.com/CVEDB/awesome-cve-repo

- https://github.com/CVEDB/top

- https://github.com/CalegariMindSec/Exploit-CVE-2019-2725

- https://github.com/Challengers-win/Sec-Interview-ai

- https://github.com/CnHack3r/Penetration_PoC

- https://github.com/Correia-jpv/fucking-awesome-web-security

- https://github.com/EchoGin404/-

- https://github.com/EchoGin404/gongkaishouji

- https://github.com/Elsfa7-110/kenzer-templates

- https://github.com/ExpLangcn/HVVExploitApply_POC

- https://github.com/FlyfishSec/weblogic_rce

- https://github.com/FoolMitAh/WeblogicScan

- https://github.com/GGyao/weblogic_2019_2725_wls_batch

- https://github.com/GhostTroops/TOP

- https://github.com/GrrrDog/Java-Deserialization-Cheat-Sheet

- https://github.com/H1CH444MREB0RN/PenTest-free-tools

- https://github.com/HimmelAward/Goby_POC

- https://github.com/ImranTheThirdEye/AD-Pentesting-Tools

- https://github.com/JERRY123S/all-poc

- https://github.com/JFR-C/Windows-Penetration-Testing

- https://github.com/JasonLOU/WeblogicScan-master

- https://github.com/Jean-Francois-C/Windows-Penetration-Testing

- https://github.com/Kairoven/Vulnerability-Data

- https://github.com/Kamiya767/CVE-2019-2725

- https://github.com/KayCHENvip/vulnerability-poc

- https://github.com/MacAsure/WL_Scan_GO

- https://github.com/Mehedi-Babu/pentest_tools_repo

- https://github.com/Mehedi-Babu/web_security_cyber

- https://github.com/Miraitowa70/POC-Notes

- https://github.com/Mr-xn/Penetration_Testing_POC

- https://github.com/MrPWH/Pentest-Tools

- https://github.com/N0b1e6/CVE-2019-2725-POC

- https://github.com/NyxAzrael/Goby_POC

- https://github.com/Ostorlab/KEV

- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors

- https://github.com/Oxc4ndl3/Web-Pentest

- https://github.com/PalindromeLabs/Java-Deserialization-CVEs

- https://github.com/ParrotSec-CN/ParrotSecCN_Community_QQbot

- https://github.com/QChiLan/weblogic

- https://github.com/QChiLan/weblogicscanner

- https://github.com/Quinn-Yan/HackerWithDocker

- https://github.com/S3cur3Th1sSh1t/My-starred-Repositories

- https://github.com/S3cur3Th1sSh1t/Pentest-Tools

- https://github.com/SexyBeast233/SecBooks

- https://github.com/ShyTangerine/WL_Scan_GO

- https://github.com/SkyBlueEternal/CNVD-C-2019-48814-CNNVD-201904-961

- https://github.com/Soundaryakambhampati/test-6

- https://github.com/Threekiii/Awesome-POC

- https://github.com/TopScrew/CVE-2019-2725

- https://github.com/TrojanAZhen/Self_Back

- https://github.com/Tyro-Shan/gongkaishouji

- https://github.com/Waseem27-art/ART-TOOLKIT

- https://github.com/Weik1/Artillery

- https://github.com/WingsSec/Meppo

- https://github.com/XiaomingX/awesome-poc-for-red-team

- https://github.com/Xuyan-cmd/Network-security-attack-and-defense-practice

- https://github.com/YIXINSHUWU/Penetration_Testing_POC

- https://github.com/YellowVeN0m/Pentesters-toolbox

- https://github.com/Z0fhack/Goby_POC

- https://github.com/ZTK-009/Aggressor

- https://github.com/ZTK-009/Ladon

- https://github.com/ZTK-009/Penetration_PoC

- https://github.com/ZTK-009/PowerLadon

- https://github.com/ZTK-009/RedTeamer

- https://github.com/Zero094/Vulnerability-verification

- https://github.com/aiici/weblogicAllinone

- https://github.com/alex14324/Eagel

- https://github.com/alphaSeclab/sec-daily-2019

- https://github.com/amcai/myscan

- https://github.com/aw-junaid/Web-Security

- https://github.com/awake1t/Awesome-hacking-tools

- https://github.com/awsassets/weblogic_exploit

- https://github.com/aymankhder/Windows-Penetration-Testing

- https://github.com/black-mirror/Weblogic

- https://github.com/cqkenuo/Weblogic-scan

- https://github.com/cross2to/betaseclab_tools

- https://github.com/cuclizihan/group_wuhuangwansui

- https://github.com/cyberanand1337x/bug-bounty-2022

- https://github.com/d4n-sec/d4n-sec.github.io

- https://github.com/davidmthomsen/CVE-2019-2725

- https://github.com/developer3000S/PoC-in-GitHub

- https://github.com/diggid4ever/Weblogic-XMLDecoder-POC

- https://github.com/djytmdj/Tool_Summary

- https://github.com/dli408097/WebSecurity

- https://github.com/dr0op/WeblogicScan

- https://github.com/ducducuc111/Awesome-web-security

- https://github.com/elinakrmova/RedTeam-Tools

- https://github.com/elinakrmova/awesome-web-security

- https://github.com/emtee40/win-pentest-tools

- https://github.com/enomothem/PenTestNote

- https://github.com/fengjixuchui/RedTeamer

- https://github.com/forhub2021/weblogicScanner

- https://github.com/getanehAl/Windows-Penetration-Testing

- https://github.com/hack-parthsharma/Pentest-Tools

- https://github.com/hanc00l/some_pocsuite

- https://github.com/hasee2018/Penetration_Testing_POC

- https://github.com/hectorgie/PoC-in-GitHub

- https://github.com/hktalent/TOP

- https://github.com/hktalent/bug-bounty

- https://github.com/hmoytx/weblogicscan

- https://github.com/huan-cdm/secure_tools_link

- https://github.com/huike007/penetration_poc

- https://github.com/huike007/poc

- https://github.com/huisetiankong478/penetration_poc

- https://github.com/huisetiankong478/poc

- https://github.com/ianxtianxt/CVE-2019-2725

- https://github.com/iceMatcha/CNTA-2019-0014xCVE-2019-2725

- https://github.com/iceberg-N/WL_Scan_GO

- https://github.com/itscio/Aggressor

- https://github.com/jared1981/More-Pentest-Tools

- https://github.com/jas502n/CNVD-C-2019-48814

- https://github.com/jbmihoub/all-poc

- https://github.com/jiangsir404/POC-S

- https://github.com/jiansiting/CVE-2019-2725

- https://github.com/jweny/pocassistdb

- https://github.com/k8gege/Aggressor

- https://github.com/k8gege/Ladon

- https://github.com/k8gege/PowerLadon

- https://github.com/kdandy/pentest_tools

- https://github.com/kenuoseclab/Weblogic-scan

- https://github.com/kerlingcode/CVE-2019-2725

- https://github.com/koutto/jok3r-pocs

- https://github.com/langu-xyz/JavaVulnMap

- https://github.com/lanmaovp-dev/shexiangshi-cm-YVJsF2HuAHndPiLB

- https://github.com/lasensio/cve-2019-2725

- https://github.com/leerina/CVE-2019-2725

- https://github.com/lions2012/Penetration_Testing_POC

- https://github.com/lnick2023/nicenice

- https://github.com/lowliness9/sectools

- https://github.com/lp008/Hack-readme

- https://github.com/ludy-dev/Oracle-WLS-Weblogic-RCE

- https://github.com/lufeirider/CVE-2019-2725

- https://github.com/merlinepedra/Pentest-Tools

- https://github.com/merlinepedra/nuclei-templates

- https://github.com/merlinepedra25/Pentest-Tools

- https://github.com/merlinepedra25/Pentest-Tools-1

- https://github.com/merlinepedra25/nuclei-templates

- https://github.com/mishmashclone/GrrrDog-Java-Deserialization-Cheat-Sheet

- https://github.com/mishmashclone/qazbnm456-awesome-web-security

- https://github.com/mmioimm/weblogic_test

- https://github.com/mrzzy/govware-2019-demos

- https://github.com/n0-traces/cve_monitor

- https://github.com/nitishbadole/Pentest_Tools

- https://github.com/nomi-sec/PoC-in-GitHub

- https://github.com/password520/Penetration_PoC

- https://github.com/password520/RedTeamer

- https://github.com/pathakabhi24/Pentest-Tools

- https://github.com/paulveillard/cybersecurity-web-security

- https://github.com/pentration/gongkaishouji

- https://github.com/pimps/CVE-2019-2725

- https://github.com/pjgmonteiro/Pentest-tools

- https://github.com/psibot/oracle-weblogic-vulnerable

- https://github.com/pwnagelabs/VEF

- https://github.com/qazbnm456/awesome-cve-poc

- https://github.com/qazbnm456/awesome-web-security

- https://github.com/qi4L/WeblogicScan-go

- https://github.com/qi4L/WeblogicScan.go

- https://github.com/r0eXpeR/redteam_vul

- https://github.com/rabbitmask/WeblogicScan

- https://github.com/rabbitmask/WeblogicScanLot

- https://github.com/rabbitmask/WeblogicScanServer

- https://github.com/retr0-13/Pentest-Tools

- https://github.com/rockmelodies/rocComExpRce

- https://github.com/rupton/xmldecoder-demo

- https://github.com/safe6Sec/WeblogicVuln

- https://github.com/severnake/Pentest-Tools

- https://github.com/shack2/javaserializetools

- https://github.com/skytina/CNVD-C-2019-48814-COMMON

- https://github.com/sobinge/nuclei-templates

- https://github.com/sponkmonk/Ladon_english_update

- https://github.com/superfish9/pt

- https://github.com/syadg123/WeblogicScan

- https://github.com/theyoge/AD-Pentesting-Tools

- https://github.com/tobechenghuai/CNTA-2019-0014xCVE-2019-2725

- https://github.com/trganda/starrlist

- https://github.com/veo/vscan

- https://github.com/weeka10/-hktalent-TOP

- https://github.com/welove88888/CVE-2019-2725

- https://github.com/whitfieldsdad/epss

- https://github.com/whoadmin/pocs

- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-

- https://github.com/wr0x00/Lizard

- https://github.com/wr0x00/Lsploit

- https://github.com/wukong-bin/weblogiscan

- https://github.com/xbl2022/awesome-hacking-lists

- https://github.com/xbl3/awesome-cve-poc_qazbnm456

- https://github.com/xuetusummer/Penetration_Testing_POC

- https://github.com/yedada-wei/-

- https://github.com/yedada-wei/gongkaishouji

- https://github.com/zema1/oracle-vuln-crawler

- https://github.com/zhuang-liu-maker/Vulnerability-Data

- https://github.com/zhusx110/cve-2019-2725