Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-14645 PoC — Oracle Fusion Middleware WebLogic Server Core组件安全漏洞

Source
Associated Vulnerability
Title:Oracle Fusion Middleware WebLogic Server Core组件安全漏洞 (CVE-2020-14645)
Description:Oracle Fusion Middleware(Oracle融合中间件)是美国甲骨文(Oracle)公司的一套面向企业和云环境的业务创新平台。该平台提供了中间件、软件集合等功能。WebLogic Server是其中的一个适用于云环境和传统环境的应用服务器组件。 Oracle Fusion Middleware中的WebLogic Server的Core组件存在安全漏洞。攻击者可利用该漏洞控制Oracle WebLogic Server,影响数据的可用性、保密性和完整性。以下产品及版本受到影响:Oracl
Description
Weblogic CVE-2020-14645 UniversalExtractor JNDI injection getDatabaseMetaData()
Readme
# CVE-2020-14645
Weblogic CVE-2020-14645 UniversalExtractor JNDI injection getDatabaseMetaData()

Project depends on https://github.com/5up3rc/weblogic_cmd

# Demo
![image.png](https://qiita-image-store.s3.ap-northeast-1.amazonaws.com/0/593424/5efa4e85-0d4c-f559-380d-a8f9610d2a0f.png)

# Require
1. JDK Version < JDK6u211/7u201/8u191 
2. Weblogic Version 12.2.1.4.0

Do not use illegally!!!!!!!!

# Reference
1. https://www.anquanke.com/post/id/210724
2. https://github.com/5up3rc/weblogic_cmd
# Thanks
[@Smi1e](https://github.com/Smi1eSEC)
@MitAh
File Snapshot

[4.0K] /data/pocs/8b62a0a5f963efff46c9fd2256e4dfa63978f161 ├── [1.1K] CVE_2020_14645.java ├── [ 34K] LICENSE └── [ 549] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.