Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-2883 PoC — Oracle Fusion Middleware 安全漏洞

Source
Associated Vulnerability
Title:Oracle Fusion Middleware 安全漏洞 (CVE-2020-2883)
Description:Oracle Fusion Middleware(Oracle融合中间件)是美国甲骨文(Oracle)公司的一套面向企业和云环境的业务创新平台。该平台提供了中间件、软件集合等功能。 Oracle Fusion Middleware中的WebLogic Server的Core组件存在安全漏洞。攻击者可利用该漏洞控制WebLogic Server,影响数据的可用性、保密性和完整性。以下产品及版本受到影响:WebLogic Server 10.3.6.0.0版本,12.1.3.0.0版本,12.2.1.3.0版
Description
POC for CVE-2020-2883
Readme
# POC_CVE-2020-2883
POC for CVE-2020-2883
- Use it with CVE-2020-2555 Server
- POC v2 OK
- POC v1+v3 in working
File Snapshot

[4.0K] /data/pocs/b4f11aba81ae21173ce020cfe049efe792f003f3 ├── [ 766] CVE_2020_2883.iml ├── [4.0K] lib │   ├── [ 50K] cache-api.jar │   ├── [ 22K] coherence-discovery.jar │   ├── [168K] coherence-hotcache.jar │   ├── [ 24K] coherence-http-grizzly.jar │   ├── [ 26K] coherence-http-jetty.jar │   ├── [ 41K] coherence-http-netty.jar │   ├── [ 27K] coherence-http-simple.jar │   ├── [ 13M] coherence.jar │   ├── [241K] coherence-jcache.jar │   ├── [4.9K] coherence-jpa.jar │   ├── [ 653] coherence-loadbalancer.jar │   ├── [135K] coherence-management.jar │   ├── [ 18K] coherence-metrics.jar │   ├── [192K] coherence-mock.jar │   ├── [1.2M] coherence-rest.jar │   ├── [ 29K] coherence-transaction.rar │   ├── [2.6K] coherence-tx.rar │   ├── [235K] coherence-web.jar │   ├── [ 33K] coherence-work.jar │   ├── [2.7M] je.jar │   ├── [262K] jline.jar │   ├── [ 15K] licenses.txt │   ├── [4.0K] security │   │   ├── [6.7K] coherence-login.jar │   │   ├── [ 174] login.config │   │   ├── [1.4K] permissions.xsd │   │   └── [ 27K] security.policy │   └── [ 82K] webInstaller.jar ├── [4.0K] out │   └── [4.0K] production │   └── [4.0K] CVE_2020_2883 │   ├── [ 236] ASCISInterf.class │   └── [5.2K] ASCISPlayer.class ├── [ 112] README.md └── [4.0K] src ├── [ 161] ASCISInterf.java └── [7.3K] ASCISPlayer.java 6 directories, 33 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.