Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-2883 PoC — Oracle Fusion Middleware 安全漏洞

Source
Associated Vulnerability
Title:Oracle Fusion Middleware 安全漏洞 (CVE-2020-2883)
Description:Oracle Fusion Middleware(Oracle融合中间件)是美国甲骨文(Oracle)公司的一套面向企业和云环境的业务创新平台。该平台提供了中间件、软件集合等功能。 Oracle Fusion Middleware中的WebLogic Server的Core组件存在安全漏洞。攻击者可利用该漏洞控制WebLogic Server,影响数据的可用性、保密性和完整性。以下产品及版本受到影响:WebLogic Server 10.3.6.0.0版本,12.1.3.0.0版本,12.2.1.3.0版
Description
CVE-2020-2883
Readme
# what's this
This project which based weblogic_cmd is a poc for CVE-2020-2883.

# Two Gadget
First:
~~~
ObjectInputStream.readObject()
    PriorityQueue.readObject()
        PriorityQueue.heapify()
            PriorityQueue.siftDown()
                siftDownUsingComparator()
                    com.tangosol.util.comparator.ExtractorComparator.compare()
                        com.tangosol.util.extractor.ChainedExtractor.extract()
                            com.tangosol.util.extractor.ReflectionExtractor().extract()
                                Method.invoke()
    							.......
                            com.tangosol.util.extractor.ReflectionExtractor().extract()
                                Method.invoke()
                                Runtime.exec()                  
~~~
![gadget1](./image/Gadget1.jpg)

Second:
~~~
ObjectInputStream.readObject()
    PriorityQueue.readObject()
        PriorityQueue.heapify()
            PriorityQueue.siftDown()
                siftDownUsingComparator()
                    com.tangosol.util.extractor.AbstractExtractor.compare()
                      com.tangosol.util.extractor.MultiExtractor.extract()
                        com.tangosol.util.extractor.ChainedExtractor.extract()
                            com.tangosol.util.extractor.ChainedExtractor.extract()
                                com.tangosol.util.extractor.ReflectionExtractor().extract()
                                    Method.invoke()
    								.......
                                com.tangosol.util.extractor.ReflectionExtractor().extract()
                                    Method.invoke()
                                    Runtime.exec()                  
~~~
![gadget2](./image/Gadget2.jpg)







                                
File Snapshot

[4.0K] /data/pocs/4154e835067909d65be20792f71e557e1e9796e6 ├── [4.0K] image │   ├── [297K] Gadget1.jpg │   └── [316K] Gadget2.jpg ├── [4.0K] lib │   ├── [ 53K] commons-cli-1.4.jar │   ├── [546K] commons-collections-3.1.jar │   ├── [395K] jsafeFIPS.jar │   ├── [1.1K] wlcipher.jar │   └── [ 56M] wlfullclient.jar ├── [1.7K] README.md ├── [4.0K] src │   ├── [4.0K] com │   │   └── [4.0K] supeream │   │   ├── [2.5K] CVE_2020_2883_2.java │   │   ├── [2.6K] CVE_2020_2883.java │   │   ├── [8.6K] Main.java │   │   ├── [4.0K] payload │   │   │   ├── [1.2K] PayloadTest.java │   │   │   └── [3.0K] RemoteImpl.java │   │   ├── [4.0K] serial │   │   │   ├── [2.3K] BytesOperation.java │   │   │   ├── [1.1K] Reflections.java │   │   │   ├── [ 12K] SerialDataGenerator.java │   │   │   └── [ 987] Serializables.java │   │   ├── [4.0K] ssl │   │   │   ├── [1012] SocketFactory.java │   │   │   ├── [ 618] TrustManagerImpl.java │   │   │   └── [ 341] WeblogicTrustManager.java │   │   └── [4.0K] weblogic │   │   ├── [1.2K] BypassPayloadSelector.java │   │   ├── [ 819] ObjectTest.java │   │   ├── [4.8K] T3ProtocolOperation.java │   │   ├── [8.5K] T3Test.java │   │   └── [1.8K] WebLogicOperation.java │   ├── [4.0K] META-INF │   │   └── [ 53] MANIFEST.MF │   └── [4.0K] weblogic │   ├── [4.0K] jms │   │   └── [4.0K] common │   │   └── [ 36K] StreamMessageImpl.java │   ├── [4.0K] security │   │   └── [4.0K] utils │   │   ├── [ 27K] SSLSetup.java │   │   └── [7.6K] SSLTrustValidator.java │   └── [4.0K] socket │   └── [6.6K] ChannelSSLSocketFactory.java ├── [4.0K] target │   └── [4.0K] production │   └── [4.0K] weblogic_cmd │   ├── [4.0K] com │   │   └── [4.0K] supeream │   │   ├── [1.8K] CVE_2020_14645.class │   │   ├── [3.0K] CVE_2020_2555.class │   │   ├── [2.2K] CVE_2020_2883_2.class │   │   ├── [2.2K] CVE_2020_2883.class │   │   ├── [8.4K] Main.class │   │   ├── [4.0K] payload │   │   │   ├── [1.0K] PayloadTest.class │   │   │   └── [3.5K] RemoteImpl.class │   │   ├── [4.0K] serial │   │   │   ├── [2.6K] BytesOperation.class │   │   │   ├── [2.1K] Reflections.class │   │   │   ├── [ 12K] SerialDataGenerator.class │   │   │   └── [1.6K] Serializables.class │   │   ├── [4.0K] ssl │   │   │   ├── [1.5K] SocketFactory.class │   │   │   ├── [ 885] TrustManagerImpl.class │   │   │   └── [ 572] WeblogicTrustManager.class │   │   └── [4.0K] weblogic │   │   ├── [1.5K] BypassPayloadSelector.class │   │   ├── [1.5K] ObjectTest.class │   │   ├── [4.9K] T3ProtocolOperation.class │   │   ├── [1.6K] T3Test.class │   │   └── [2.1K] WebLogicOperation.class │   ├── [4.0K] META-INF │   │   ├── [ 53] MANIFEST.MF │   │   └── [ 16] weblogic_cmd.kotlin_module │   └── [4.0K] weblogic │   ├── [4.0K] jms │   │   └── [4.0K] common │   │   └── [ 20K] StreamMessageImpl.class │   ├── [4.0K] security │   │   └── [4.0K] utils │   │   ├── [ 17K] SSLSetup.class │   │   └── [5.0K] SSLTrustValidator.class │   └── [4.0K] socket │   └── [6.4K] ChannelSSLSocketFactory.class └── [ 645] weblogic_cmd.iml 32 directories, 56 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.