cve/2019/CVE-2019-2725.md

205 lines
9.9 KiB
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2019-2725](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2725)
![](https://img.shields.io/static/v1?label=Product&message=Tape%20Library%20ACSLS&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%208.5%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20WebLogic%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20WebLogic%20Server.&color=brighgreen)
### Description
Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: Web Services). Supported versions that are affected are 10.3.6.0.0 and 12.1.3.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
### POC
#### Reference
- http://packetstormsecurity.com/files/152756/Oracle-Weblogic-Server-Deserialization-Remote-Code-Execution.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
- https://www.exploit-db.com/exploits/46780/
- https://www.oracle.com/security-alerts/cpujan2020.html
#### Github
- https://github.com/0day404/vulnerability-poc
- https://github.com/0day666/Vulnerability-verification
- https://github.com/0ps/pocassistdb
- https://github.com/0xMrNiko/Awesome-Red-Teaming
- https://github.com/0xT11/CVE-POC
- https://github.com/0xn0ne/weblogicScanner
- https://github.com/1120362990/vulnerability-list
- https://github.com/189569400/Meppo
- https://github.com/20142995/pocsuite
- https://github.com/20142995/pocsuite3
- https://github.com/20142995/sectool
- https://github.com/404notf0und/Security-Data-Analysis-and-Visualization
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ARPSyndicate/kenzer-templates
- https://github.com/AdeliaNitzsche/Java-Deserialization-Cheat-Sheet
- https://github.com/Advisory-Newsletter/REvil-
- https://github.com/Amar224/Pentest-Tools
- https://github.com/AnonVulc/Pentest-Tools
- https://github.com/ArrestX/--POC
- https://github.com/BitTheByte/Eagle
- https://github.com/BrittanyKuhn/javascript-tutorial
- https://github.com/Bywalks/WeblogicScan
- https://github.com/CLincat/vulcat
- https://github.com/CVCLabs/cve-2019-2725
- https://github.com/CVEDB/PoC-List
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/CVEDB/top
- https://github.com/CalegariMindSec/Exploit-CVE-2019-2725
- https://github.com/CnHack3r/Penetration_PoC
- https://github.com/Correia-jpv/fucking-awesome-web-security
- https://github.com/EchoGin404/-
- https://github.com/EchoGin404/gongkaishouji
- https://github.com/Elsfa7-110/kenzer-templates
- https://github.com/ExpLangcn/HVVExploitApply_POC
- https://github.com/FlyfishSec/weblogic_rce
- https://github.com/FoolMitAh/WeblogicScan
- https://github.com/GGyao/weblogic_2019_2725_wls_batch
- https://github.com/GhostTroops/TOP
- https://github.com/GrrrDog/Java-Deserialization-Cheat-Sheet
- https://github.com/H1CH444MREB0RN/PenTest-free-tools
- https://github.com/HimmelAward/Goby_POC
- https://github.com/ImranTheThirdEye/AD-Pentesting-Tools
- https://github.com/JERRY123S/all-poc
- https://github.com/Jean-Francois-C/Windows-Penetration-Testing
- https://github.com/Kamiya767/CVE-2019-2725
- https://github.com/KayCHENvip/vulnerability-poc
- https://github.com/MacAsure/WL_Scan_GO
- https://github.com/Mehedi-Babu/pentest_tools_repo
- https://github.com/Mehedi-Babu/web_security_cyber
- https://github.com/Miraitowa70/POC-Notes
- https://github.com/Mr-xn/Penetration_Testing_POC
- https://github.com/N0b1e6/CVE-2019-2725-POC
- https://github.com/Ostorlab/KEV
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
- https://github.com/Oxc4ndl3/Web-Pentest
- https://github.com/PalindromeLabs/Java-Deserialization-CVEs
- https://github.com/ParrotSec-CN/ParrotSecCN_Community_QQbot
- https://github.com/Quinn-Yan/HackerWithDocker
- https://github.com/S3cur3Th1sSh1t/Pentest-Tools
- https://github.com/SexyBeast233/SecBooks
- https://github.com/SkyBlueEternal/CNVD-C-2019-48814-CNNVD-201904-961
- https://github.com/Soundaryakambhampati/test-6
- https://github.com/Threekiii/Awesome-POC
- https://github.com/TopScrew/CVE-2019-2725
2024-06-07 04:52:01 +00:00
- https://github.com/Tyro-Shan/gongkaishouji
2024-05-26 14:27:05 +02:00
- https://github.com/Waseem27-art/ART-TOOLKIT
- https://github.com/Weik1/Artillery
- https://github.com/WingsSec/Meppo
- https://github.com/Xuyan-cmd/Network-security-attack-and-defense-practice
- https://github.com/YIXINSHUWU/Penetration_Testing_POC
- https://github.com/YellowVeN0m/Pentesters-toolbox
- https://github.com/Z0fhack/Goby_POC
2024-05-27 13:12:02 +00:00
- https://github.com/ZTK-009/Penetration_PoC
- https://github.com/ZTK-009/RedTeamer
2024-05-26 14:27:05 +02:00
- https://github.com/Zero094/Vulnerability-verification
- https://github.com/aiici/weblogicAllinone
- https://github.com/alex14324/Eagel
- https://github.com/alphaSeclab/sec-daily-2019
- https://github.com/amcai/myscan
- https://github.com/awake1t/Awesome-hacking-tools
- https://github.com/awsassets/weblogic_exploit
- https://github.com/aymankhder/Windows-Penetration-Testing
- https://github.com/black-mirror/Weblogic
- https://github.com/cqkenuo/Weblogic-scan
- https://github.com/cross2to/betaseclab_tools
- https://github.com/cuclizihan/group_wuhuangwansui
- https://github.com/cyberanand1337x/bug-bounty-2022
- https://github.com/d4n-sec/d4n-sec.github.io
- https://github.com/davidmthomsen/CVE-2019-2725
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/diggid4ever/Weblogic-XMLDecoder-POC
- https://github.com/djytmdj/Tool_Summary
- https://github.com/dli408097/WebSecurity
- https://github.com/dr0op/WeblogicScan
- https://github.com/ducducuc111/Awesome-web-security
- https://github.com/elinakrmova/RedTeam-Tools
- https://github.com/elinakrmova/awesome-web-security
- https://github.com/emtee40/win-pentest-tools
- https://github.com/enomothem/PenTestNote
- https://github.com/fengjixuchui/RedTeamer
- https://github.com/forhub2021/weblogicScanner
- https://github.com/hack-parthsharma/Pentest-Tools
- https://github.com/hanc00l/some_pocsuite
- https://github.com/hasee2018/Penetration_Testing_POC
- https://github.com/hectorgie/PoC-in-GitHub
- https://github.com/hktalent/TOP
- https://github.com/hktalent/bug-bounty
- https://github.com/hmoytx/weblogicscan
- https://github.com/huike007/penetration_poc
- https://github.com/huike007/poc
- https://github.com/ianxtianxt/CVE-2019-2725
- https://github.com/iceMatcha/CNTA-2019-0014xCVE-2019-2725
- https://github.com/iceberg-N/WL_Scan_GO
- https://github.com/jared1981/More-Pentest-Tools
- https://github.com/jas502n/CNVD-C-2019-48814
- https://github.com/jbmihoub/all-poc
- https://github.com/jiangsir404/POC-S
- https://github.com/jiansiting/CVE-2019-2725
- https://github.com/jweny/pocassistdb
2024-06-07 04:52:01 +00:00
- https://github.com/k8gege/Aggressor
2024-05-26 14:27:05 +02:00
- https://github.com/k8gege/Ladon
2024-06-07 04:52:01 +00:00
- https://github.com/k8gege/PowerLadon
2024-05-26 14:27:05 +02:00
- https://github.com/kdandy/pentest_tools
- https://github.com/kenuoseclab/Weblogic-scan
- https://github.com/kerlingcode/CVE-2019-2725
- https://github.com/koutto/jok3r-pocs
- https://github.com/langu-xyz/JavaVulnMap
- https://github.com/lasensio/cve-2019-2725
- https://github.com/leerina/CVE-2019-2725
- https://github.com/lions2012/Penetration_Testing_POC
- https://github.com/lnick2023/nicenice
- https://github.com/lowliness9/sectools
- https://github.com/lp008/Hack-readme
- https://github.com/ludy-dev/Oracle-WLS-Weblogic-RCE
- https://github.com/lufeirider/CVE-2019-2725
- https://github.com/merlinepedra/Pentest-Tools
- https://github.com/merlinepedra/nuclei-templates
- https://github.com/merlinepedra25/Pentest-Tools
- https://github.com/merlinepedra25/Pentest-Tools-1
- https://github.com/merlinepedra25/nuclei-templates
- https://github.com/mishmashclone/GrrrDog-Java-Deserialization-Cheat-Sheet
- https://github.com/mishmashclone/qazbnm456-awesome-web-security
- https://github.com/mmioimm/weblogic_test
- https://github.com/mrzzy/govware-2019-demos
- https://github.com/nitishbadole/Pentest_Tools
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/password520/Penetration_PoC
- https://github.com/password520/RedTeamer
- https://github.com/pathakabhi24/Pentest-Tools
- https://github.com/paulveillard/cybersecurity-web-security
- https://github.com/pimps/CVE-2019-2725
- https://github.com/pjgmonteiro/Pentest-tools
- https://github.com/pwnagelabs/VEF
- https://github.com/qazbnm456/awesome-cve-poc
- https://github.com/qazbnm456/awesome-web-security
- https://github.com/qi4L/WeblogicScan.go
- https://github.com/r0eXpeR/redteam_vul
2024-06-07 04:52:01 +00:00
- https://github.com/rabbitmask/WeblogicScan
2024-05-26 14:27:05 +02:00
- https://github.com/rabbitmask/WeblogicScanLot
- https://github.com/retr0-13/Pentest-Tools
- https://github.com/rockmelodies/rocComExpRce
- https://github.com/safe6Sec/WeblogicVuln
- https://github.com/severnake/Pentest-Tools
- https://github.com/shack2/javaserializetools
- https://github.com/skytina/CNVD-C-2019-48814-COMMON
- https://github.com/sobinge/nuclei-templates
- https://github.com/sponkmonk/Ladon_english_update
- https://github.com/superfish9/pt
- https://github.com/theyoge/AD-Pentesting-Tools
- https://github.com/trganda/starrlist
- https://github.com/veo/vscan
- https://github.com/weeka10/-hktalent-TOP
- https://github.com/welove88888/CVE-2019-2725
- https://github.com/whitfieldsdad/epss
- https://github.com/whoadmin/pocs
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
- https://github.com/wr0x00/Lizard
- https://github.com/wr0x00/Lsploit
- https://github.com/xbl2022/awesome-hacking-lists
- https://github.com/xbl3/awesome-cve-poc_qazbnm456
- https://github.com/xuetusummer/Penetration_Testing_POC
- https://github.com/yedada-wei/-
- https://github.com/yedada-wei/gongkaishouji
- https://github.com/zema1/oracle-vuln-crawler
- https://github.com/zhusx110/cve-2019-2725