Entreprise d'experts en Sécurité Informatique : Audits et conseils en cybersécurité
Entreprise française de cybersécurité depuis 2004
☎ 03 60 47 09 81 - info@securiteinfo.com


CVE-2020-2555

Description

Vulnerability in the Oracle Coherence product of Oracle Fusion Middleware (component: Caching,CacheStore,Invocation). Supported versions that are affected are 3.7.1.0, 12.1.3.0.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3 to compromise Oracle Coherence. Successful attacks of this vulnerability can result in takeover of Oracle Coherence. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

POC

Reference

- http://packetstormsecurity.com/files/157054/Oracle-Coherence-Fusion-Middleware-Remote-Code-Execution.html

- http://packetstormsecurity.com/files/157207/Oracle-WebLogic-Server-12.2.1.4.0-Remote-Code-Execution.html

- http://packetstormsecurity.com/files/157795/WebLogic-Server-Deserialization-Remote-Code-Execution.html

- https://www.oracle.com/security-alerts/cpujan2020.html

- https://www.oracle.com/security-alerts/cpujan2021.html

- https://www.oracle.com/security-alerts/cpujul2020.html

- https://www.oracle.com/security-alerts/cpujul2021.html

- https://www.oracle.com/security-alerts/cpuoct2020.html

Github

- https://github.com/0x727/JNDIExploit

- https://github.com/0xMarcio/cve

- https://github.com/0xT11/CVE-POC

- https://github.com/0xi7/Log4j

- https://github.com/0xn0ne/weblogicScanner

- https://github.com/20142995/Goby

- https://github.com/20142995/nuclei-templates

- https://github.com/20142995/pocsuite3

- https://github.com/20142995/sectool

- https://github.com/2lambda123/CVE-mitre

- https://github.com/2lambda123/JNDIExploit

- https://github.com/2lambda123/Windows10Exploits

- https://github.com/5l1v3r1/CVE-2020-2556

- https://github.com/ARPSyndicate/cve-scores

- https://github.com/ARPSyndicate/cvemon

- https://github.com/AabyssZG/AWD-Guide

- https://github.com/AdeliaNitzsche/Java-Deserialization-Cheat-Sheet

- https://github.com/BigFatBobbb/JDDIExploit

- https://github.com/BrittanyKuhn/javascript-tutorial

- https://github.com/CVEDB/PoC-List

- https://github.com/CVEDB/awesome-cve-repo

- https://github.com/CVEDB/top

- https://github.com/ChHsiching/GitHub-Chinese-Top-Charts

- https://github.com/Challengers-win/Sec-Interview-ai

- https://github.com/CnHack3r/Penetration_PoC

- https://github.com/Coldplay1517/Middleware-Vulnerability-detection-master

- https://github.com/DustNerd/JNDIExploitPlus

- https://github.com/Dviros/log4shell-possible-malware

- https://github.com/EchoGin404/-

- https://github.com/EchoGin404/gongkaishouji

- https://github.com/FreeK0x00/JNDIExploitPlus

- https://github.com/GhostTroops/TOP

- https://github.com/GrrrDog/Java-Deserialization-Cheat-Sheet

- https://github.com/Hatcat123/my_stars

- https://github.com/HimmelAward/Goby_POC

- https://github.com/Hpd0ger/weblogic_hpcmd

- https://github.com/Hu3sky/CVE-2020-2555

- https://github.com/Hypdncy/JNDIBypassExploit

- https://github.com/I7Z3R0/Log4j

- https://github.com/Ivan1ee/weblogic-framework

- https://github.com/JERRY123S/all-poc

- https://github.com/Jeromeyoung/JNDIExploit-1

- https://github.com/Joellots/OT-Research

- https://github.com/KimJun1010/WeblogicTool

- https://github.com/Live-Hack-CVE/CVE-2020-2555

- https://github.com/LucasPDiniz/CVE-2020-14882

- https://github.com/MacAsure/WL_Scan_GO

- https://github.com/Maskhe/cve-2020-2555

- https://github.com/Mbilse/GitHub-Chinese-Top-Charts

- https://github.com/MelanyRoob/Goby

- https://github.com/Mr-xn/JNDIExploit-1

- https://github.com/Mr-xn/Penetration_Testing_POC

- https://github.com/NetW0rK1le3r/awesome-hacking-lists

- https://github.com/NyxAzrael/Goby_POC

- https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame

- https://github.com/Ostorlab/KEV

- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors

- https://github.com/PalindromeLabs/Java-Deserialization-CVEs

- https://github.com/Qynklee/POC_CVE-2020-2555

- https://github.com/Qynklee/POC_CVE-2020-2883

- https://github.com/R0ser1/GadgetInspector

- https://github.com/S3cur3Th1sSh1t/My-starred-Repositories

- https://github.com/SexyBeast233/SecBooks

- https://github.com/ShyTangerine/WL_Scan_GO

- https://github.com/TacticsTeam/sg_ysoserial

- https://github.com/TrojanAZhen/Self_Back

- https://github.com/Tyro-Shan/gongkaishouji

- https://github.com/Uvemode/CVE-2020-2555

- https://github.com/Weik1/Artillery

- https://github.com/WhiteHSBG/JNDIExploit

- https://github.com/Y4er/CVE-2020-14756

- https://github.com/Y4er/CVE-2020-2555

- https://github.com/Y4er/CVE-2020-2883

- https://github.com/Y4er/WebLogic-Shiro-shell

- https://github.com/YIXINSHUWU/Penetration_Testing_POC

- https://github.com/Z0fhack/Goby_POC

- https://github.com/ZTK-009/Penetration_PoC

- https://github.com/aHlo666/JNDIExploit

- https://github.com/adm1in/CodeTest

- https://github.com/alphaSeclab/sec-daily-2020

- https://github.com/amcai/myscan

- https://github.com/apachecn-archive/Middleware-Vulnerability-detection

- https://github.com/awsassets/weblogic_exploit

- https://github.com/bhassani/Recent-CVE

- https://github.com/blue-duty/stars

- https://github.com/bright-angel/sec-repos

- https://github.com/cyb3r-w0lf/nuclei-template-collection

- https://github.com/cyberanand1337x/bug-bounty-2022

- https://github.com/d4n-sec/d4n-sec.github.io

- https://github.com/dbierer/php-sec-update

- https://github.com/developer3000S/PoC-in-GitHub

- https://github.com/dream0x01/weblogic-framework

- https://github.com/duty9527/stars

- https://github.com/feihong-cs/Attacking_Shiro_with_CVE_2020_2555

- https://github.com/fkie-cad/nvd-json-data-feeds

- https://github.com/forhub2021/weblogicScanner

- https://github.com/gobysec/Goby

- https://github.com/gobysec/Weblogic

- https://github.com/hasee2018/Penetration_Testing_POC

- https://github.com/hectorgie/PoC-in-GitHub

- https://github.com/hktalent/CVE_2020_2546

- https://github.com/hktalent/TOP

- https://github.com/hktalent/bug-bounty

- https://github.com/huan-cdm/secure_tools_link

- https://github.com/huike007/penetration_poc

- https://github.com/huike007/poc

- https://github.com/huisetiankong478/penetration_poc

- https://github.com/huisetiankong478/poc

- https://github.com/hungslab/awd-tools

- https://github.com/iceberg-N/WL_Scan_GO

- https://github.com/jbmihoub/all-poc

- https://github.com/kenyon-wong/JNDIExploit

- https://github.com/koala2099/GitHub-Chinese-Top-Charts

- https://github.com/koutto/jok3r-pocs

- https://github.com/langu-xyz/JavaVulnMap

- https://github.com/lanmaovp-dev/shexiangshi-cm-YVJsF2HuAHndPiLB

- https://github.com/lions2012/Penetration_Testing_POC

- https://github.com/lnick2023/nicenice

- https://github.com/lovechinacoco/https-github.com-mai-lang-chai-Middleware-Vulnerability-detection

- https://github.com/mickhuu/jndi_tool

- https://github.com/mishmashclone/GrrrDog-Java-Deserialization-Cheat-Sheet

- https://github.com/mofang1104/weblogic-framework

- https://github.com/neilzhang1/Chinese-Charts

- https://github.com/netveil/Awesome-List

- https://github.com/nomi-sec/PoC-in-GitHub

- https://github.com/nu11secur1ty/CVE-mitre

- https://github.com/nu11secur1ty/CVE-nu11secur1ty

- https://github.com/nu11secur1ty/Windows10Exploits

- https://github.com/onewinner/VulToolsKit

- https://github.com/pap1rman/JNDIExploit-modify

- https://github.com/password520/Penetration_PoC

- https://github.com/pentration/gongkaishouji

- https://github.com/pinkie-ljz/GitHub-Chinese-Top-Charts

- https://github.com/pinkieli/GitHub-Chinese-Top-Charts

- https://github.com/psibot/oracle-weblogic-vulnerable

- https://github.com/qazbnm456/awesome-cve-poc

- https://github.com/qi4L/WeblogicScan-go

- https://github.com/qi4L/WeblogicScan.go

- https://github.com/qingyuanfeiniao/Chinese-Top-Charts

- https://github.com/raystyle/paper

- https://github.com/readloud/Awesome-Stars

- https://github.com/retr0-13/Goby

- https://github.com/safe6Sec/WeblogicVuln

- https://github.com/safe6Sec/wlsEnv

- https://github.com/samjcs/log4shell-possible-malware

- https://github.com/shadowsock5/JNDIExploit

- https://github.com/shengshengli/weblogic-framework

- https://github.com/soosmile/POC

- https://github.com/sp4zcmd/WeblogicExploit-GUI

- https://github.com/sv3nbeast/weblogic-framework

- https://github.com/taielab/awesome-hacking-lists

- https://github.com/tdtc7/qps

- https://github.com/tovd-go/Weblogic_GadGet

- https://github.com/weeka10/-hktalent-TOP

- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-

- https://github.com/wr0x00/Lizard

- https://github.com/wr0x00/Lsploit

- https://github.com/wsfengfan/CVE-2020-2555

- https://github.com/wukong-bin/weblogicpoc

- https://github.com/wzqawp/weblogic-framework

- https://github.com/xbl2022/awesome-hacking-lists

- https://github.com/xbl3/awesome-cve-poc_qazbnm456

- https://github.com/xuetusummer/Penetration_Testing_POC

- https://github.com/yedada-wei/-

- https://github.com/yedada-wei/gongkaishouji

- https://github.com/zhaojunliing/awesome-stars

- https://github.com/zhzyker/exphub

- https://github.com/zhzyker/vulmap

- https://github.com/zoroqi/my-awesome

- https://github.com/zzwlpx/weblogicPoc