# POC&EXP of CVE-2023-21931
[**CVE-2023-21931 Analysis Article**](https://medium.com/@MMMarch7/unpacking-cve-2023-21931-a-comprehensive-analysis-of-the-weblogic-vulnerability-with-poc-exp-f2927e881572)
**[JNDI-Injection-Exploit](https://github.com/welk1n/JNDI-Injection-Exploit)**
## Description
Before running the PoC script, it's advisable to add the following JAR files as library dependencies:
```
coherence\lib
oracle_common\lib
oracle_common\modules
wlserver\modules
```
## POC&EXP
https://satoshi-box.com/pay/CJhZuu
[4.0K] /data/pocs/48b43e4f1518fc9061751666c5acd71b7ceaf5df
└── [ 531] README.md
0 directories, 1 file