Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: Web Services). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0 and 12.2.1.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
- http://packetstormsecurity.com/files/155886/Oracle-Weblogic-10.3.6.0.0-Remote-Command-Execution.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpujul2021.html
- https://github.com/0ps/pocassistdb
- https://github.com/0xPThree/WebLogic
- https://github.com/0xT11/CVE-POC
- https://github.com/0xn0ne/weblogicScanner
- https://github.com/20142995/nuclei-templates
- https://github.com/20142995/pocsuite3
- https://github.com/20142995/sectool
- https://github.com/4ra1n/poc-runner
- https://github.com/ARPSyndicate/cve-scores
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ARPSyndicate/kenzer-templates
- https://github.com/AdeliaNitzsche/Java-Deserialization-Cheat-Sheet
- https://github.com/BrittanyKuhn/javascript-tutorial
- https://github.com/Bywalks/WeblogicScan
- https://github.com/CVEDB/PoC-List
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/CVEDB/top
- https://github.com/FoolMitAh/WeblogicScan
- https://github.com/GhostTroops/TOP
- https://github.com/GrrrDog/Java-Deserialization-Cheat-Sheet
- https://github.com/JERRY123S/all-poc
- https://github.com/Kamiya767/CVE-2019-2725
- https://github.com/Luchoane/CVE-2019-2729_creal
- https://github.com/ParrotSec-CN/ParrotSecCN_Community_QQbot
- https://github.com/QChiLan/weblogic
- https://github.com/QChiLan/weblogicscanner
- https://github.com/S3cur3Th1sSh1t/My-starred-Repositories
- https://github.com/SexyBeast233/SecBooks
- https://github.com/Weik1/Artillery
- https://github.com/ZTK-009/RedTeamer
- https://github.com/aiici/weblogicAllinone
- https://github.com/amcai/myscan
- https://github.com/angeloqmartin/Vulnerability-Assessment
- https://github.com/awake1t/Awesome-hacking-tools
- https://github.com/awsassets/weblogic_exploit
- https://github.com/black-mirror/Weblogic
- https://github.com/cross2to/betaseclab_tools
- https://github.com/cyberanand1337x/bug-bounty-2022
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/djytmdj/Tool_Summary
- https://github.com/dr0op/WeblogicScan
- https://github.com/fengjixuchui/RedTeamer
- https://github.com/forhub2021/weblogicScanner
- https://github.com/hectorgie/PoC-in-GitHub
- https://github.com/hktalent/TOP
- https://github.com/hmoytx/weblogicscan
- https://github.com/huan-cdm/secure_tools_link
- https://github.com/jbmihoub/all-poc
- https://github.com/jiangsir404/POC-S
- https://github.com/jweny/pocassistdb
- https://github.com/koutto/jok3r-pocs
- https://github.com/langu-xyz/JavaVulnMap
- https://github.com/lanmaovp-dev/shexiangshi-cm-YVJsF2HuAHndPiLB
- https://github.com/lp008/Hack-readme
- https://github.com/mishmashclone/GrrrDog-Java-Deserialization-Cheat-Sheet
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/password520/RedTeamer
- https://github.com/pimps/CVE-2019-2725
- https://github.com/pizza-power/weblogic-CVE-2019-2729-POC
- https://github.com/psibot/oracle-weblogic-vulnerable
- https://github.com/pwnagelabs/VEF
- https://github.com/qi4L/WeblogicScan-go
- https://github.com/qi4L/WeblogicScan.go
- https://github.com/qianxiao996/FrameScan
- https://github.com/qtgavc/list
- https://github.com/rabbitmask/WeblogicScan
- https://github.com/rabbitmask/WeblogicScanLot
- https://github.com/rabbitmask/WeblogicScanServer
- https://github.com/rockmelodies/rocComExpRce
- https://github.com/ruthlezs/CVE-2019-2729-Exploit
- https://github.com/safe6Sec/wlsEnv
- https://github.com/superfish9/pt
- https://github.com/syadg123/WeblogicScan
- https://github.com/tanjiti/sec_profile
- https://github.com/trganda/starrlist
- https://github.com/veo/vscan
- https://github.com/waffl3ss/CVE-2019-2729
- https://github.com/weeka10/-hktalent-TOP
- https://github.com/whoadmin/pocs
- https://github.com/wr0x00/Lizard
- https://github.com/wr0x00/Lsploit
- https://github.com/wukong-bin/weblogiscan
- https://github.com/zema1/oracle-vuln-crawler