Entreprise d'experts en Sécurité Informatique : Audits et conseils en cybersécurité
Entreprise française de cybersécurité depuis 2004
☎ 03 60 47 09 81 - info@securiteinfo.com


CVE-2020-14882

Description

Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Console). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

POC

Reference

- http://packetstormsecurity.com/files/159769/Oracle-WebLogic-Server-Remote-Code-Execution.html

- http://packetstormsecurity.com/files/160143/Oracle-WebLogic-Server-Administration-Console-Handle-Remote-Code-Execution.html

- http://packetstormsecurity.com/files/161128/Oracle-WebLogic-Server-12.2.1.0-Remote-Code-Execution.html

- https://www.oracle.com/security-alerts/cpuoct2020.html

Github

- https://github.com/0day666/Vulnerability-verification

- https://github.com/0thm4n3/cve-2020-14882

- https://github.com/0x783kb/Security-operation-book

- https://github.com/0xMrNiko/Awesome-Red-Teaming

- https://github.com/0xn0ne/weblogicScanner

- https://github.com/1n7erface/PocList

- https://github.com/20142995/nuclei-templates

- https://github.com/20142995/pocsuite3

- https://github.com/20142995/sectool

- https://github.com/ARPSyndicate/cve-scores

- https://github.com/ARPSyndicate/cvemon

- https://github.com/ARPSyndicate/kenzer-templates

- https://github.com/AleksaZatezalo/CVE-2020-14882

- https://github.com/Ares-X/VulWiki

- https://github.com/Astrogeorgeonethree/Starred

- https://github.com/Atem1988/Starred

- https://github.com/Awrrays/FrameVul

- https://github.com/CLincat/vulcat

- https://github.com/CVEDB/PoC-List

- https://github.com/CVEDB/awesome-cve-repo

- https://github.com/CVEDB/top

- https://github.com/CYJoe-Cyclone/Awesome-CobaltStrike

- https://github.com/Coldplay1517/Middleware-Vulnerability-detection-master

- https://github.com/DSO-Lab/pocscan

- https://github.com/Danny-LLi/CVE-2020-14882

- https://github.com/EdgeSecurityTeam/Vulnerability

- https://github.com/Elsfa7-110/kenzer-templates

- https://github.com/ExpLangcn/HVVExploitApply_POC

- https://github.com/FDlucifer/firece-fish

- https://github.com/GGyao/CVE-2020-14882_ALL

- https://github.com/GGyao/CVE-2020-14882_POC

- https://github.com/GhostTroops/TOP

- https://github.com/Hatcat123/my_stars

- https://github.com/HimmelAward/Goby_POC

- https://github.com/JERRY123S/all-poc

- https://github.com/JFR-C/Windows-Penetration-Testing

- https://github.com/Jean-Francois-C/Windows-Penetration-Testing

- https://github.com/KKC73/weblogic-cve-2020-14882

- https://github.com/KatherineHuangg/metasploit-POC

- https://github.com/KcanCurly/WurlyCVEs

- https://github.com/KimJun1010/WeblogicTool

- https://github.com/LucasPDiniz/CVE-2020-14882

- https://github.com/LucasPDiniz/StudyRoom

- https://github.com/Luhaozhhhe/360_Practice_and_Training

- https://github.com/MacAsure/WL_Scan_GO

- https://github.com/Madbat2024/Penetration-test

- https://github.com/Manor99/CVE-2020-14882-

- https://github.com/MicahFleming/Risk-Assessment-Cap-Stone-

- https://github.com/MichaelKoczwara/Awesome-CobaltStrike-Defence

- https://github.com/Mr-xn/Penetration_Testing_POC

- https://github.com/N0Coriander/CVE-2020-14882-14883

- https://github.com/NS-Sp4ce/CVE-2020-14882

- https://github.com/NetW0rK1le3r/awesome-hacking-lists

- https://github.com/NyxAzrael/Goby_POC

- https://github.com/Ormicron/CVE-2020-14882-GUI-Test

- https://github.com/Ostorlab/KEV

- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors

- https://github.com/QmF0c3UK/CVE-2020-14882

- https://github.com/Root-Shells/CVE-2020-14882

- https://github.com/S3cur3Th1sSh1t/My-starred-Repositories

- https://github.com/Serendipity-Lucky/CVE-2020-14882_ALL

- https://github.com/SexyBeast233/SecBooks

- https://github.com/ShyTangerine/WL_Scan_GO

- https://github.com/Singhsanjeev617/A-Red-Teamer-diaries

- https://github.com/SouthWind0/southwind0.github.io

- https://github.com/Threekiii/Awesome-Exploit

- https://github.com/Threekiii/Awesome-POC

- https://github.com/Threekiii/Awesome-Redteam

- https://github.com/Threekiii/Vulhub-Reproduce

- https://github.com/TrojanAZhen/Self_Back

- https://github.com/Umarovm/-Patched-McMaster-University-Blind-Command-Injection

- https://github.com/Weik1/Artillery

- https://github.com/XTeam-Wing/CVE-2020-14882

- https://github.com/XTeam-Wing/RedTeaming2020

- https://github.com/XiaomingX/awesome-poc-for-red-team

- https://github.com/Yang0615777/PocList

- https://github.com/Z0fhack/Goby_POC

- https://github.com/Zero094/Vulnerability-verification

- https://github.com/adm1in/CodeTest

- https://github.com/aiici/weblogicAllinone

- https://github.com/alexfrancow/CVE-2020-14882

- https://github.com/alphaSeclab/sec-daily-2020

- https://github.com/amcai/myscan

- https://github.com/apachecn-archive/Middleware-Vulnerability-detection

- https://github.com/awake1t/Awesome-hacking-tools

- https://github.com/aymankhder/Windows-Penetration-Testing

- https://github.com/bakery312/Vulhub-Reproduce

- https://github.com/bhassani/Recent-CVE

- https://github.com/bhdresh/SnortRules

- https://github.com/bigblackhat/oFx

- https://github.com/blackend/Diario-RedTem

- https://github.com/blue-duty/stars

- https://github.com/bonjourmalware/melody

- https://github.com/c04tl/WebLogic-Handle-RCE-Scanner

- https://github.com/cc8700619/poc

- https://github.com/co-devs/cve-otx-lookup

- https://github.com/corelight/CVE-2020-14882-weblogicRCE

- https://github.com/cri1wa/MemShell

- https://github.com/ct-scorch/Security-Assessment-Findings-Report

- https://github.com/cvebase/cvebase-wiki

- https://github.com/cyberanand1337x/bug-bounty-2022

- https://github.com/d4n-sec/d4n-sec.github.io

- https://github.com/daehee/nvd

- https://github.com/developer3000S/PoC-in-GitHub

- https://github.com/djytmdj/Tool_Summary

- https://github.com/duty9527/stars

- https://github.com/exploitblizzard/CVE-2020-14882-WebLogic

- https://github.com/fei9747/Awesome-CobaltStrike

- https://github.com/ferreirasc/redteam-arsenal

- https://github.com/forhub2021/weblogicScanner

- https://github.com/g1san/Agents-for-Vulnerable-Dockers-and-related-Benchmarks

- https://github.com/getanehAl/Windows-Penetration-Testing

- https://github.com/gnarkill78/CSA_S2_2024

- https://github.com/hanc00l/some_pocsuite

- https://github.com/hectorgie/PoC-in-GitHub

- https://github.com/hktalent/TOP

- https://github.com/hktalent/bug-bounty

- https://github.com/huan-cdm/secure_tools_link

- https://github.com/huike007/penetration_poc

- https://github.com/huisetiankong478/penetration_poc

- https://github.com/iceberg-N/WL_Scan_GO

- https://github.com/ihebski/A-Red-Teamer-diaries

- https://github.com/jas502n/CVE-2020-14882

- https://github.com/jbmihoub/all-poc

- https://github.com/jcabrale/Melody

- https://github.com/jeansgit/Pentest

- https://github.com/john-automates/Bsides_2023_Resources

- https://github.com/kalikaneko/unvd

- https://github.com/keshavskn123/CDAC

- https://github.com/killvxk/Awesome-Exploit

- https://github.com/kk98kk0/CVE-2020-14882

- https://github.com/koala2099/GitHub-Chinese-Top-Charts

- https://github.com/koutto/jok3r-pocs

- https://github.com/langu-xyz/JavaVulnMap

- https://github.com/lanmaovp-dev/shexiangshi-cm-YVJsF2HuAHndPiLB

- https://github.com/leoambrus/CheckersNomisec

- https://github.com/lions2012/Penetration_Testing_POC

- https://github.com/lolminerxmrig/CVE-2020-14882_ALL

- https://github.com/lolminerxmrig/Capricornus

- https://github.com/lovechinacoco/https-github.com-mai-lang-chai-Middleware-Vulnerability-detection

- https://github.com/ludy-dev/Weblogic_Unauthorized-bypass-RCE

- https://github.com/ma111e/melody

- https://github.com/merlinepedra/nuclei-templates

- https://github.com/merlinepedra25/nuclei-templates

- https://github.com/milo2012/CVE-2020-14882

- https://github.com/mmioimm/cve-2020-14882

- https://github.com/murataydemir/CVE-2020-14882

- https://github.com/murataydemir/CVE-2020-14883

- https://github.com/n0-traces/cve_monitor

- https://github.com/neilzhang1/Chinese-Charts

- https://github.com/netveil/Awesome-List

- https://github.com/nice0e3/CVE-2020-14882_Exploit_Gui

- https://github.com/nik0nz7/CVE-2020-14882

- https://github.com/niudaii/go-crack

- https://github.com/nomi-sec/PoC-in-GitHub

- https://github.com/onewinner/VulToolsKit

- https://github.com/openx-org/BLEN

- https://github.com/ovProphet/CVE-2020-14882-checker

- https://github.com/pen4uin/awesome-vulnerability-research

- https://github.com/pen4uin/vulnerability-research

- https://github.com/pen4uin/vulnerability-research-list

- https://github.com/pit-lock/hacking

- https://github.com/plzheheplztrying/cve_monitor

- https://github.com/pprietosanchez/CVE-2020-14750

- https://github.com/psibot/oracle-weblogic-vulnerable

- https://github.com/puckiestyle/A-Red-Teamer-diaries

- https://github.com/pwn3z/CVE-2020-14882-WebLogic

- https://github.com/qeeqbox/falcon

- https://github.com/qi4L/WeblogicScan-go

- https://github.com/qi4L/WeblogicScan.go

- https://github.com/qianniaoge/CVE-2020-14882_Exploit_Gui

- https://github.com/qingyuanfeiniao/Chinese-Top-Charts

- https://github.com/r0eXpeR/redteam_vul

- https://github.com/readloud/Awesome-Stars

- https://github.com/reph0r/poc-exp

- https://github.com/reph0r/poc-exp-tools

- https://github.com/retr0-13/Awesome-CobaltStrike-Defence

- https://github.com/s1kr10s/CVE-2020-14882

- https://github.com/shadowdevnotreal/Awesome-CobaltStrike

- https://github.com/sobinge/nuclei-templates

- https://github.com/soosmile/POC

- https://github.com/sp4zcmd/WeblogicExploit-GUI

- https://github.com/superfish9/pt

- https://github.com/tpdlshdmlrkfmcla/WebLogic_CVE_2020_14882

- https://github.com/trganda/starrlist

- https://github.com/tufanturhan/Red-Teamer-Diaries

- https://github.com/tzwlhack/Vulnerability

- https://github.com/user20252228/WebLogic_CVE_2020_14882

- https://github.com/veo/vscan

- https://github.com/weeka10/-hktalent-TOP

- https://github.com/whoadmin/pocs

- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-

- https://github.com/wr0x00/Lizard

- https://github.com/wr0x00/Lsploit

- https://github.com/wsfengfan/cve-2020-14882

- https://github.com/wuzuowei/nice-scripts

- https://github.com/xMr110/CVE-2020-14882

- https://github.com/xfiftyone/CVE-2020-14882

- https://github.com/xiaoyaovo/2021SecWinterTask

- https://github.com/xinyisleep/pocscan

- https://github.com/xuetusummer/Penetration_Testing_POC

- https://github.com/yaklang/vulinone

- https://github.com/yhy0/ExpDemo-JavaFX

- https://github.com/yichensec/Bug_writer

- https://github.com/yyzsec/2021SecWinterTask

- https://github.com/zer0yu/Awesome-CobaltStrike

- https://github.com/zesnd/CVE-2020-14882-POC

- https://github.com/zhaojunliing/awesome-stars

- https://github.com/zhzyker/exphub

- https://github.com/zhzyker/vulmap

- https://github.com/zoroqi/my-awesome