POC详情: 4c35a8627c33bc2e8d074fe94318ae8658d5422e

来源
关联漏洞
标题: Oracle WebLogic Server 安全漏洞 (CVE-2020-14882)
描述:Oracle WebLogic Server是美国甲骨文(Oracle)公司的一款适用于云环境和传统环境的应用服务中间件,它提供了一个现代轻型开发平台,支持应用从开发到生产的整个生命周期管理,并简化了应用的部署和管理。 Oracle WebLogic Server 多版本的Oracle Fusion Middleware 存在安全漏洞,该漏洞使未经身份验证的攻击者可以通过HTTP访问网络,从而破坏Oracle WebLogic Server。 受影响产品及版本如下: 10.3.6.0.0版本, 12.1.
描述
Detection of RCE in Oracle's WebLogic Server CVE-2020-14882 / CVE-2020-14750
介绍
# Detection of RCE in Oracle's "WebLogic Server" CVE-2020-14882 / CVE-2020-14750

## Summary:  
Detection of attempts to exploit CVE-2020-14882 and CVE-2020-14750 - Unauthenticated RCE in Oracle's Weblogic Server.

## References: 
Oracle's advisories:    
- CVE-2020-14882 https://www.oracle.com/security-alerts/cpuoct2020traditional.html  
- CVE-2020-14750 https://www.oracle.com/security-alerts/alert-cve-2020-14750.html  

Exploit PoC (in Vietnamese):  
- https://testbnull.medium.com/weblogic-rce-by-only-one-get-request-cve-2020-14882-analysis-6e4b09981dbf  
Exploit PoC video:  
- https://youtu.be/JFVDOIL0YtA  

Vendor write-ups including exploitation in the wild:  
- https://isc.sans.edu/forums/diary/PATCH+NOW+CVE202014882+Weblogic+Actively+Exploited+Against+Honeypots/26734/   
- https://isc.sans.edu/forums/diary/Cryptojacking+Targeting+WebLogic+TCP7001/26768/
- https://blog.rapid7.com/2020/10/29/oracle-weblogic-unauthenticated-complete-takeover-cve-2020-14882-what-you-need-to-know/  
- https://threatpost.com/oracle-update-weblogic-server-flaw/160889/  

## Notices raised:   

|Detection scope|notice msg|notice sub field|Fidelity of alert|
|-|-|-|-|
|POST method successful exploit|Potentially successful exploit of Oracle's WebLogic Server Remote Code Execution vulnerability (CVE-2020-14882 and CVE-2020-14750) using POST method. Refer to https://www.oracle.com/security-alerts/cpuoct2020traditional.html and https://www.oracle.com/security-alerts/alert-cve-2020-14750.html. See sub field for artifacts.|[REDACTED due to TLP of source pcap]|HIGH|
|GET method successful exploit|Potentially successful exploit of Oracle's WebLogic Server Remote Code Execution vulnerability (CVE-2020-14882 and CVE-2020-14750) using GET method. Refer to https://www.oracle.com/security-alerts/cpuoct2020traditional.html and https://www.oracle.com/security-alerts/alert-cve-2020-14750.html. See sub field for artifacts.|[REDACTED due to TLP of source pcap]|HIGH|
|POST method unsuccessful attempt|Unsuccessful exploit attempt of Oracle's WebLogic Server Remote Code Execution vulnerability (CVE-2020-14882 and CVE-2020-14750) using POST method. Refer to https://www.oracle.com/security-alerts/cpuoct2020traditional.html and https://www.oracle.com/security-alerts/alert-cve-2020-14750.html. See sub field for artifacts.|[REDACTED due to TLP of source pcap]|HIGH|
|GET method unsuccessful attempt|Unsuccessful exploit attempt of Oracle's WebLogic Server Remote Code Execution vulnerability (CVE-2020-14882 and CVE-2020-14750) using GET method. Refer to https://www.oracle.com/security-alerts/cpuoct2020traditional.html and https://www.oracle.com/security-alerts/alert-cve-2020-14750.html. See sub field for artifacts.|[REDACTED due to TLP of source pcap]|HIGH|


## Usage, notes and recommendations:

- This package can include a sample of the Server's response in the notice. This is to assist incident responders triage the detection. 
If you wish to have the server response artifacts included in your notice.log, change this option in scripts/main.zeek from the default `F` to `T` like so:    
``const include_exploited_server_response_in_notice: bool = T;``

- By default this package detects on all TCP ports, not just the default port 7001/tcp. To change the behavior to only detect on the specified port, use these options in scripts/main.zeek:  
`const detect_default_port_only: bool = T;`   
`const default_port: port = 7001/tcp;`  

- By default this package detects ALL exploit attempts - successful and unsuccessful. To change the behavior to only detect successful exploits, use these options in scripts/main.zeek:      
`const detect_unsuccessful_attempts: bool = F;`

- If you have scanners that you wish to exclude from detection, add them to the scripts/scanner_exclude_from_detection.zeek file.

- To run against a pcap you already have ```zeek -Cr your.pcap scripts/__load__.zeek```   

- This package will run in clustered or non clustered environments.   

## Feedback
- As details emerge, we are keen to improve this package for the benefit of the community, please feel free to contact the author with any suggestions and feedback.
文件快照

[4.0K] /data/pocs/4c35a8627c33bc2e8d074fe94318ae8658d5422e ├── [ 178] bro-pkg.meta ├── [1.5K] LICENSE ├── [4.1K] README.md ├── [4.0K] scripts │   ├── [ 62] __load__.zeek │   ├── [7.5K] main.zeek │   └── [ 186] scanner_exclude_from_detection.zeek └── [ 178] zkg.meta 1 directory, 7 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。