Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-2725 PoC — Oracle Fusion Middleware WebLogic Server组件访问控制错误漏洞

Source
Associated Vulnerability
Title:Oracle Fusion Middleware WebLogic Server组件访问控制错误漏洞 (CVE-2019-2725)
Description:Oracle Fusion Middleware(Oracle融合中间件)是美国甲骨文(Oracle)公司的一套面向企业和云环境的业务创新平台。该平台提供了中间件、软件集合等功能。WebLogic Server是其中的一个适用于云环境和传统环境的应用服务器组件。 部分版本WebLogic中默认包含的wls9_async_response包,为WebLogicServer提供异步通讯服务。由于该WAR包在反序列化处理输入信息时存在缺陷,攻击者可以发送精心构造的恶意HTTP请求,获得目标服务器的权限,在未授权
Description
(CVE-2019-2725) Oracle WLS(Weblogic) RCE test sciript
Readme
# Oracle-WLS-Weblogic-RCE
(CVE-2019-2725) Oracle WLS(Weblogic) RCE test sciript

CVE-2019-2725 is a deserialization vulnerability in Oracle WebLogic Server. This remote code execution vulnerability is remotely exploitable without authentication. 

This script which check the presence or absence of a page is based on Python3. (Updated. 20.11.07.)

Usage>

    python Oracle WLS(Weblogic) RCE(CVE-2019-2725).py <dst_ip> <dst_port> (user defined port)
    
    python Oracle WLS(Weblogic) RCE(CVE-2019-2725).py <dst_ip> (default : 80/tcp)
       
File Snapshot

[4.0K] /data/pocs/fe6272b2962a5de2f685076f079a3bcd1e327302 ├── [ 904] Oracle WLS(Weblogic) RCE(CVE-2019-2725).py └── [ 546] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.