cve/2020/CVE-2020-2551.md

183 lines
8.8 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2020-2551](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2551)
![](https://img.shields.io/static/v1?label=Product&message=WebLogic%20Server&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%2010.3.6.0.0%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20IIOP%20to%20compromise%20Oracle%20WebLogic%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20WebLogic%20Server.&color=brighgreen)
### Description
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: WLS Core Components). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via IIOP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
### POC
#### Reference
- https://www.oracle.com/security-alerts/cpujan2020.html
#### Github
- https://github.com/0x727/JNDIExploit
- https://github.com/0xAbbarhSF/CVE-Exploit
2024-06-10 18:01:06 +00:00
- https://github.com/0xMarcio/cve
2024-05-25 21:48:12 +02:00
- https://github.com/0xMrNiko/Awesome-Red-Teaming
- https://github.com/0xT11/CVE-POC
- https://github.com/0xlane/CVE-2020-2551
- https://github.com/0xn0ne/weblogicScanner
- https://github.com/20142995/sectool
- https://github.com/2lambda123/JNDIExploit
- https://github.com/5l1v3r1/CVE-2020-2553
- https://github.com/8ypass/weblogicExploit
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ARPSyndicate/kenzer-templates
- https://github.com/AabyssZG/AWD-Guide
- https://github.com/AdeliaNitzsche/Java-Deserialization-Cheat-Sheet
- https://github.com/Amar224/Pentest-Tools
- https://github.com/AnonVulc/Pentest-Tools
- https://github.com/BigFatBobbb/JDDIExploit
- https://github.com/BrittanyKuhn/javascript-tutorial
- https://github.com/CVEDB/PoC-List
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/CVEDB/top
- https://github.com/CnHack3r/Penetration_PoC
- https://github.com/DaMinGshidashi/CVE-2020-2551
- https://github.com/Dido1960/Weblogic-CVE-2020-2551-To-Internet
- https://github.com/Dviros/log4shell-possible-malware
- https://github.com/EchoGin404/-
- https://github.com/EchoGin404/gongkaishouji
- https://github.com/Elsfa7-110/kenzer-templates
- https://github.com/FoolMitAh/WeblogicScan
- https://github.com/FreeK0x00/JNDIExploitPlus
- https://github.com/GhostTroops/TOP
- https://github.com/GrrrDog/Java-Deserialization-Cheat-Sheet
- https://github.com/H1CH444MREB0RN/PenTest-free-tools
- https://github.com/Hatcat123/my_stars
- https://github.com/HimmelAward/Goby_POC
- https://github.com/Hypdncy/JNDIBypassExploit
- https://github.com/I7Z3R0/Log4j
- https://github.com/ImranTheThirdEye/AD-Pentesting-Tools
- https://github.com/Ivan1ee/weblogic-framework
- https://github.com/JERRY123S/all-poc
- https://github.com/Jeromeyoung/JNDIExploit-1
- https://github.com/KimJun1010/WeblogicTool
- https://github.com/Live-Hack-CVE/CVE-2020-2551
- https://github.com/Mehedi-Babu/pentest_tools_repo
- https://github.com/MelanyRoob/Goby
- https://github.com/Mr-xn/JNDIExploit-1
- https://github.com/Mr-xn/Penetration_Testing_POC
- https://github.com/NetW0rK1le3r/awesome-hacking-lists
- https://github.com/Ostorlab/KEV
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
- https://github.com/PalindromeLabs/Java-Deserialization-CVEs
- https://github.com/S3cur3Th1sSh1t/Pentest-Tools
- https://github.com/SexyBeast233/SecBooks
- https://github.com/Shadowven/Vulnerability_Reproduction
- https://github.com/SummerSec/BlogPapers
- https://github.com/SummerSec/BlogParpers
- https://github.com/TacticsTeam/sg_ysoserial
2024-06-07 04:52:01 +00:00
- https://github.com/Tyro-Shan/gongkaishouji
2024-05-25 21:48:12 +02:00
- https://github.com/Waseem27-art/ART-TOOLKIT
- https://github.com/Weik1/Artillery
- https://github.com/WhiteHSBG/JNDIExploit
- https://github.com/Y4er/CVE-2020-2551
- https://github.com/YIXINSHUWU/Penetration_Testing_POC
- https://github.com/YellowVeN0m/Pentesters-toolbox
- https://github.com/Z0fhack/Goby_POC
2024-05-27 13:12:02 +00:00
- https://github.com/ZTK-009/Penetration_PoC
2024-05-25 21:48:12 +02:00
- https://github.com/aHlo666/JNDIExploit
- https://github.com/alphaSeclab/sec-daily-2020
- https://github.com/apachecn-archive/Middleware-Vulnerability-detection
- https://github.com/atdpa4sw0rd/Experience-library
- https://github.com/awake1t/Awesome-hacking-tools
- https://github.com/awsassets/weblogic_exploit
- https://github.com/cyberanand1337x/bug-bounty-2022
- https://github.com/d4n-sec/d4n-sec.github.io
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/djytmdj/Tool_Summary
- https://github.com/dream0x01/weblogic-framework
- https://github.com/elinakrmova/RedTeam-Tools
- https://github.com/emtee40/win-pentest-tools
- https://github.com/forhub2021/weblogicScanner
- https://github.com/githublihaha/vul
- https://github.com/gobysec/Goby
- https://github.com/gobysec/Weblogic
- https://github.com/goddemondemongod/Sec-Interview
- https://github.com/hack-parthsharma/Pentest-Tools
- https://github.com/hanc00l/some_pocsuite
- https://github.com/hasee2018/Penetration_Testing_POC
- https://github.com/hectorgie/PoC-in-GitHub
- https://github.com/hktalent/CVE-2020-2551
- https://github.com/hktalent/CVE_2020_2546
- https://github.com/hktalent/CreateOneMinJar
- https://github.com/hktalent/TOP
- https://github.com/hktalent/bug-bounty
2024-08-05 18:41:32 +00:00
- https://github.com/huan-cdm/secure_tools_link
2024-05-25 21:48:12 +02:00
- https://github.com/huike007/penetration_poc
- https://github.com/huike007/poc
2024-06-10 07:22:43 +00:00
- https://github.com/hungslab/awd-tools
2024-05-25 21:48:12 +02:00
- https://github.com/jared1981/More-Pentest-Tools
- https://github.com/jas502n/CVE-2020-2551
- https://github.com/jbmihoub/all-poc
- https://github.com/jiangsir404/POC-S
- https://github.com/kdandy/pentest_tools
- https://github.com/kenyon-wong/JNDIExploit
- https://github.com/koala2099/GitHub-Chinese-Top-Charts
- https://github.com/langu-xyz/JavaVulnMap
- https://github.com/lions2012/Penetration_Testing_POC
- https://github.com/lnick2023/nicenice
- https://github.com/lovechinacoco/https-github.com-mai-lang-chai-Middleware-Vulnerability-detection
- https://github.com/lz2y/CVE-2021-2394
- https://github.com/merlinepedra/Pentest-Tools
- https://github.com/merlinepedra/nuclei-templates
- https://github.com/merlinepedra25/Pentest-Tools
- https://github.com/merlinepedra25/Pentest-Tools-1
- https://github.com/merlinepedra25/nuclei-templates
- https://github.com/mickhuu/jndi_tool
- https://github.com/mishmashclone/GrrrDog-Java-Deserialization-Cheat-Sheet
- https://github.com/mofang1104/weblogic-framework
- https://github.com/musana/exploits
- https://github.com/neilzhang1/Chinese-Charts
- https://github.com/netveil/Awesome-List
- https://github.com/nitishbadole/Pentest_Tools
- https://github.com/nomi-sec/PoC-in-GitHub
2024-07-25 21:25:12 +00:00
- https://github.com/onewinner/VulToolsKit
2024-05-25 21:48:12 +02:00
- https://github.com/password520/Penetration_PoC
- https://github.com/pathakabhi24/Pentest-Tools
2024-08-12 19:01:27 +00:00
- https://github.com/pentration/gongkaishouji
2024-05-25 21:48:12 +02:00
- https://github.com/pinkieli/GitHub-Chinese-Top-Charts
- https://github.com/pjgmonteiro/Pentest-tools
- https://github.com/qazbnm456/awesome-cve-poc
- https://github.com/qi4L/WeblogicScan.go
- https://github.com/qingyuanfeiniao/Chinese-Top-Charts
- https://github.com/raystyle/paper
- https://github.com/readloud/Awesome-Stars
- https://github.com/retr0-13/Goby
- https://github.com/retr0-13/Pentest-Tools
- https://github.com/safe6Sec/WeblogicVuln
- https://github.com/samjcs/log4shell-possible-malware
- https://github.com/severnake/Pentest-Tools
- https://github.com/shadowsock5/JNDIExploit
- https://github.com/shengshengli/weblogic-framework
- https://github.com/sobinge/nuclei-templates
- https://github.com/soosmile/POC
- https://github.com/sp4zcmd/WeblogicExploit-GUI
- https://github.com/superlink996/chunqiuyunjingbachang
- https://github.com/sv3nbeast/weblogic-framework
- https://github.com/taielab/awesome-hacking-lists
- https://github.com/tdtc7/qps
- https://github.com/theyoge/AD-Pentesting-Tools
- https://github.com/trganda/starrlist
- https://github.com/w3security/CVE-2020-2551
- https://github.com/weeka10/-hktalent-TOP
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
- https://github.com/wr0x00/Lizard
- https://github.com/wr0x00/Lsploit
- https://github.com/wukong-bin/weblogicpoc
- https://github.com/wzqawp/weblogic-framework
- https://github.com/xbl2022/awesome-hacking-lists
- https://github.com/xbl3/awesome-cve-poc_qazbnm456
- https://github.com/xuetusummer/Penetration_Testing_POC
- https://github.com/yedada-wei/-
- https://github.com/yedada-wei/gongkaishouji
- https://github.com/zema1/oracle-vuln-crawler
- https://github.com/zhzyker/exphub
- https://github.com/zoroqi/my-awesome
- https://github.com/zzwlpx/weblogicPoc