Entreprise d'experts en Sécurité Informatique : Audits et conseils en cybersécurité
Entreprise française de cybersécurité depuis 2004
☎ 03 60 47 09 81 - info@securiteinfo.com


CVE-2020-2883

Description

Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via IIOP, T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

POC

Reference

- http://packetstormsecurity.com/files/157950/WebLogic-Server-Deserialization-Remote-Code-Execution.html

- https://www.oracle.com/security-alerts/cpuapr2020.html

Github

- https://github.com/0x727/JNDIExploit

- https://github.com/0xMarcio/cve

- https://github.com/0xT11/CVE-POC

- https://github.com/0xdu/WLExploit

- https://github.com/0xi7/Log4j

- https://github.com/0xn0ne/weblogicScanner

- https://github.com/20142995/nuclei-templates

- https://github.com/20142995/sectool

- https://github.com/2lambda123/JNDIExploit

- https://github.com/ARPSyndicate/cve-scores

- https://github.com/ARPSyndicate/cvemon

- https://github.com/AabyssZG/AWD-Guide

- https://github.com/AdeliaNitzsche/Java-Deserialization-Cheat-Sheet

- https://github.com/Al1ex/CVE-2020-2883

- https://github.com/BigFatBobbb/JDDIExploit

- https://github.com/BrittanyKuhn/javascript-tutorial

- https://github.com/CVEDB/PoC-List

- https://github.com/CVEDB/awesome-cve-repo

- https://github.com/CVEDB/top

- https://github.com/ChHsiching/GitHub-Chinese-Top-Charts

- https://github.com/CnHack3r/Penetration_PoC

- https://github.com/DaBoQuan/CVE-2020-14645

- https://github.com/DustNerd/JNDIExploitPlus

- https://github.com/Dviros/log4shell-possible-malware

- https://github.com/EchoGin404/-

- https://github.com/EchoGin404/gongkaishouji

- https://github.com/FancyDoesSecurity/CVE-2020-2883

- https://github.com/FoolMitAh/WeblogicScan

- https://github.com/FreeK0x00/JNDIExploitPlus

- https://github.com/GhostTroops/TOP

- https://github.com/Ghostasky/ALLStarRepo

- https://github.com/GrrrDog/Java-Deserialization-Cheat-Sheet

- https://github.com/Hatcat123/my_stars

- https://github.com/Hypdncy/JNDIBypassExploit

- https://github.com/I7Z3R0/Log4j

- https://github.com/Ivan1ee/weblogic-framework

- https://github.com/JERRY123S/all-poc

- https://github.com/Jeromeyoung/JNDIExploit-1

- https://github.com/KimJun1010/WeblogicTool

- https://github.com/Live-Hack-CVE/CVE-2020-2883

- https://github.com/LucasPDiniz/CVE-2020-14882

- https://github.com/MacAsure/WL_Scan_GO

- https://github.com/MagicZer0/Weblogic_CVE-2020-2883_POC

- https://github.com/Mbilse/GitHub-Chinese-Top-Charts

- https://github.com/Mr-xn/JNDIExploit-1

- https://github.com/Mr-xn/Penetration_Testing_POC

- https://github.com/NetW0rK1le3r/awesome-hacking-lists

- https://github.com/PalindromeLabs/Java-Deserialization-CVEs

- https://github.com/Qynklee/POC_CVE-2020-2883

- https://github.com/S3cur3Th1sSh1t/My-starred-Repositories

- https://github.com/SexyBeast233/SecBooks

- https://github.com/Shadowven/Vulnerability_Reproduction

- https://github.com/ShyTangerine/WL_Scan_GO

- https://github.com/Tyro-Shan/gongkaishouji

- https://github.com/Weik1/Artillery

- https://github.com/WhiteHSBG/JNDIExploit

- https://github.com/Y4er/CVE-2020-2883

- https://github.com/Y4er/WebLogic-Shiro-shell

- https://github.com/YIXINSHUWU/Penetration_Testing_POC

- https://github.com/ZTK-009/Penetration_PoC

- https://github.com/ZZZWD/CVE-2020-2883

- https://github.com/aHlo666/JNDIExploit

- https://github.com/alphaSeclab/sec-daily-2020

- https://github.com/amcai/myscan

- https://github.com/blue-duty/stars

- https://github.com/bright-angel/sec-repos

- https://github.com/cyb3r-w0lf/nuclei-template-collection

- https://github.com/cyberanand1337x/bug-bounty-2022

- https://github.com/developer3000S/PoC-in-GitHub

- https://github.com/dream0x01/weblogic-framework

- https://github.com/duty9527/stars

- https://github.com/forhub2021/weblogicScanner

- https://github.com/gobysec/Weblogic

- https://github.com/hasee2018/Penetration_Testing_POC

- https://github.com/hectorgie/PoC-in-GitHub

- https://github.com/hktalent/CVE_2020_2546

- https://github.com/hktalent/TOP

- https://github.com/hktalent/bug-bounty

- https://github.com/huan-cdm/secure_tools_link

- https://github.com/huike007/penetration_poc

- https://github.com/huike007/poc

- https://github.com/huisetiankong478/penetration_poc

- https://github.com/huisetiankong478/poc

- https://github.com/hungslab/awd-tools

- https://github.com/iceberg-N/WL_Scan_GO

- https://github.com/jbmihoub/all-poc

- https://github.com/kenyon-wong/JNDIExploit

- https://github.com/koala2099/GitHub-Chinese-Top-Charts

- https://github.com/koutto/jok3r-pocs

- https://github.com/krisinfosec/slowest_cve_aggregator

- https://github.com/lanmaovp-dev/shexiangshi-cm-YVJsF2HuAHndPiLB

- https://github.com/lions2012/Penetration_Testing_POC

- https://github.com/lucy9x/WLExploit

- https://github.com/mickhuu/jndi_tool

- https://github.com/mishmashclone/GrrrDog-Java-Deserialization-Cheat-Sheet

- https://github.com/mofang1104/weblogic-framework

- https://github.com/neilzhang1/Chinese-Charts

- https://github.com/netveil/Awesome-List

- https://github.com/nomi-sec/PoC-in-GitHub

- https://github.com/onewinner/VulToolsKit

- https://github.com/packetinside/CISA_BOT

- https://github.com/pap1rman/JNDIExploit-modify

- https://github.com/password520/Penetration_PoC

- https://github.com/pentration/gongkaishouji

- https://github.com/pinkie-ljz/GitHub-Chinese-Top-Charts

- https://github.com/pinkieli/GitHub-Chinese-Top-Charts

- https://github.com/qi4L/WeblogicScan-go

- https://github.com/qi4L/WeblogicScan.go

- https://github.com/qingyuanfeiniao/Chinese-Top-Charts

- https://github.com/readloud/Awesome-Stars

- https://github.com/safe6Sec/wlsEnv

- https://github.com/samjcs/log4shell-possible-malware

- https://github.com/shadowsock5/JNDIExploit

- https://github.com/shengshengli/weblogic-framework

- https://github.com/soosmile/POC

- https://github.com/sp4zcmd/WeblogicExploit-GUI

- https://github.com/suizhibo/MemShellGene

- https://github.com/superlink996/chunqiuyunjingbachang

- https://github.com/sv3nbeast/weblogic-framework

- https://github.com/taielab/awesome-hacking-lists

- https://github.com/tovd-go/Weblogic_GadGet

- https://github.com/ums91/CISA_BOT

- https://github.com/veo/vscan

- https://github.com/weeka10/-hktalent-TOP

- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-

- https://github.com/wr0x00/Lizard

- https://github.com/wr0x00/Lsploit

- https://github.com/wukong-bin/weblogicpoc

- https://github.com/wzqawp/weblogic-framework

- https://github.com/xbl2022/awesome-hacking-lists

- https://github.com/xuetusummer/Penetration_Testing_POC

- https://github.com/yedada-wei/-

- https://github.com/yedada-wei/gongkaishouji

- https://github.com/zhaojunliing/awesome-stars

- https://github.com/zhzyker/exphub

- https://github.com/zhzyker/vulmap

- https://github.com/zoroqi/my-awesome

- https://github.com/zzwlpx/weblogicPoc