Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2018-2628 PoC — Oracle Fusion Middleware 代码问题漏洞

Source
Associated Vulnerability
Title:Oracle Fusion Middleware 代码问题漏洞 (CVE-2018-2628)
Description:Oracle WebLogic Server是美国甲骨文(Oracle)公司的一款适用于云环境和传统环境的应用服务器,它提供了一个现代轻型开发平台,支持应用从开发到生产的整个生命周期管理,并简化了应用的部署和管理。WLS Core是其中的一个核心组件。 Oracle WebLogic Server中的WLS核心组件存在远程代码执行漏洞。攻击者可通过远程发送攻击数据,借助T3协议在WebLogic Server中执行反序列化操作利用该漏洞执行代码。以下版本受到影响:Oracle WebLogic Serve
Description
CVE-2018-2628 & CVE-2018-2893
Readme
# CVE-2018-2628

简单解读:https://mp.weixin.qq.com/s?__biz=MzU0NzYzMzU0Mw==&mid=2247483673&idx=1&sn=45360b4ed1c95947088121b28cb1e45e&chksm=fb4a21f1cc3da8e748b3ac6e37ac483b917857c2338b9c3f7d315c842157397e7435a7c02bb8#rd

or 
http://xxlegend.com/2018/04/18/CVE-2018-2628%20%E7%AE%80%E5%8D%95%E5%A4%8D%E7%8E%B0%E5%92%8C%E5%88%86%E6%9E%90/


this PoC can also be used to test CVE-2018-2893,haha
File Snapshot

[4.0K] /data/pocs/f94194051739bb35afe97f6f505f6f2a8fba859e ├── [ 399] README.md └── [7.5K] weblogic_poc.client1.for.scan-cve-2018-2628.py 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.