### [CVE-2018-3191](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3191) ![](https://img.shields.io/static/v1?label=Product&message=WebLogic%20Server&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3D%2010.3.6.0%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20T3%20to%20compromise%20Oracle%20WebLogic%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20WebLogic%20Server.&color=brighgreen) ### Description Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Core Components). Supported versions that are affected are 10.3.6.0, 12.1.3.0 and 12.2.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). ### POC #### Reference - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html #### Github - https://github.com/0xT11/CVE-POC - https://github.com/0xn0ne/weblogicScanner - https://github.com/1o24er/RedTeam - https://github.com/20142995/sectool - https://github.com/8ypass/weblogicExploit - https://github.com/ARPSyndicate/cvemon - https://github.com/AdeliaNitzsche/Java-Deserialization-Cheat-Sheet - https://github.com/Al1ex/Red-Team - https://github.com/Apri1y/Red-Team-links - https://github.com/BrittanyKuhn/javascript-tutorial - https://github.com/CVEDB/PoC-List - https://github.com/CVEDB/awesome-cve-repo - https://github.com/CVEDB/top - https://github.com/Echocipher/Resource-list - https://github.com/GhostTroops/TOP - https://github.com/GrrrDog/Java-Deserialization-Cheat-Sheet - https://github.com/Hatcat123/my_stars - https://github.com/JERRY123S/all-poc - https://github.com/KimJun1010/WeblogicTool - https://github.com/Libraggbond/CVE-2018-3191 - https://github.com/MacAsure/WL_Scan_GO - https://github.com/Ondrik8/RED-Team - https://github.com/PalindromeLabs/Java-Deserialization-CVEs - https://github.com/SexyBeast233/SecBooks - https://github.com/TSY244/CyberspaceSearchEngine - https://github.com/Weik1/Artillery - https://github.com/arongmh/CVE-2018-3191 - https://github.com/awake1t/Awesome-hacking-tools - https://github.com/awsassets/weblogic_exploit - https://github.com/bigblackhat/oFx - https://github.com/cross2to/betaseclab_tools - https://github.com/cyberanand1337x/bug-bounty-2022 - https://github.com/developer3000S/PoC-in-GitHub - https://github.com/djytmdj/Tool_Summary - https://github.com/dk47os3r/hongduiziliao - https://github.com/fengjixuchui/RedTeamer - https://github.com/followboy1999/weblogic-deserialization - https://github.com/forhub2021/weblogicScanner - https://github.com/hasee2018/Safety-net-information - https://github.com/hectorgie/PoC-in-GitHub - https://github.com/hktalent/TOP - https://github.com/hudunkey/Red-Team-links - https://github.com/iceberg-N/WL_Scan_GO - https://github.com/jas502n/CVE-2018-3191 - https://github.com/jbmihoub/all-poc - https://github.com/john-80/-007 - https://github.com/klausware/Java-Deserialization-Cheat-Sheet - https://github.com/koutto/jok3r-pocs - https://github.com/landscape2024/RedTeam - https://github.com/langu-xyz/JavaVulnMap - https://github.com/lnick2023/nicenice - https://github.com/lp008/Hack-readme - https://github.com/m00zh33/CVE-2018-3191 - https://github.com/mackleadmire/CVE-2018-3191-Rce-Exploit - https://github.com/mishmashclone/GrrrDog-Java-Deserialization-Cheat-Sheet - https://github.com/nobiusmallyu/kehai - https://github.com/openx-org/BLEN - https://github.com/password520/RedTeamer - https://github.com/pyn3rd/CVE-2018-3191 - https://github.com/qazbnm456/awesome-cve-poc - https://github.com/qi4L/WeblogicScan.go - https://github.com/slimdaddy/RedTeam - https://github.com/superfish9/pt - https://github.com/superlink996/chunqiuyunjingbachang - https://github.com/svbjdbk123/- - https://github.com/trganda/starrlist - https://github.com/twensoo/PersistentThreat - https://github.com/weeka10/-hktalent-TOP - https://github.com/wr0x00/Lizard - https://github.com/wr0x00/Lsploit - https://github.com/xbl3/awesome-cve-poc_qazbnm456 - https://github.com/xiaoZ-hc/redtool - https://github.com/yut0u/RedTeam-BlackBox - https://github.com/zema1/oracle-vuln-crawler