Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-14882 PoC — Oracle WebLogic Server 安全漏洞

Source
Associated Vulnerability
Title:Oracle WebLogic Server 安全漏洞 (CVE-2020-14882)
Description:Oracle WebLogic Server是美国甲骨文(Oracle)公司的一款适用于云环境和传统环境的应用服务中间件,它提供了一个现代轻型开发平台,支持应用从开发到生产的整个生命周期管理,并简化了应用的部署和管理。 Oracle WebLogic Server 多版本的Oracle Fusion Middleware 存在安全漏洞,该漏洞使未经身份验证的攻击者可以通过HTTP访问网络,从而破坏Oracle WebLogic Server。 受影响产品及版本如下: 10.3.6.0.0版本, 12.1.
Description
Check YouTube - https://youtu.be/O0ZnLXRY5Wo
Readme
<h1 style="font-size:10vw" align="center"><b>CVE-2020-14882 WebLogic</b></h1>

<h3 align="center">Connect with me:</h3>
<p align="center">
<a href="https://twitter.com/exploitblizzard" target="blank"><img align="center" src="https://github.com/edent/SuperTinyIcons/blob/master/images/svg/twitter.svg" alt="exploitblizzard" height="30" width="40" /></a>
<a href="https://www.youtube.com/channel/UCKF4IhTDSy-cmGVPHlhl50A" target="blank"><img align="center" src="https://github.com/edent/SuperTinyIcons/blob/master/images/svg/youtube.svg" alt="https://www.youtube.com/channel/uckf4ihtdsy-cmgvphlhl50a" height="30" width="40" /></a>
<a href="https://discord.gg/MJjwryfX9B" target="blank"><img align="center" src="https://github.com/edent/SuperTinyIcons/blob/master/images/svg/discord.svg" alt="https://discord.com/invite/N52JqGb" height="30" width="40" /></a>
</p>

Check YouTube - https://youtu.be/O0ZnLXRY5Wo


# Screenshot:
![CVE-2020-14882](https://user-images.githubusercontent.com/61627070/117728229-cb94b300-b206-11eb-9f9b-e0464b217772.png)

![CVE-2020-14882](https://user-images.githubusercontent.com/61627070/117728484-27f7d280-b207-11eb-9d0b-8d1dc8444a30.png)
File Snapshot

[4.0K] /data/pocs/f6a35b6b7315157055f0acbda606f503e7e6d0f5 ├── [1.5K] CVE-2020-14882_WebLogic .py └── [1.1K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.