### [CVE-2020-14882](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14882) ![](https://img.shields.io/static/v1?label=Product&message=WebLogic%20Server&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3D%2010.3.6.0.0%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20WebLogic%20Server.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20takeover%20of%20Oracle%20WebLogic%20Server.&color=brighgreen) ### Description Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Console). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). ### POC #### Reference - http://packetstormsecurity.com/files/159769/Oracle-WebLogic-Server-Remote-Code-Execution.html - http://packetstormsecurity.com/files/160143/Oracle-WebLogic-Server-Administration-Console-Handle-Remote-Code-Execution.html - http://packetstormsecurity.com/files/161128/Oracle-WebLogic-Server-12.2.1.0-Remote-Code-Execution.html - https://www.oracle.com/security-alerts/cpuoct2020.html #### Github - https://github.com/0day666/Vulnerability-verification - https://github.com/0thm4n3/cve-2020-14882 - https://github.com/0x783kb/Security-operation-book - https://github.com/0xMrNiko/Awesome-Red-Teaming - https://github.com/0xn0ne/weblogicScanner - https://github.com/1n7erface/PocList - https://github.com/20142995/pocsuite3 - https://github.com/20142995/sectool - https://github.com/ARPSyndicate/cvemon - https://github.com/ARPSyndicate/kenzer-templates - https://github.com/Ares-X/VulWiki - https://github.com/Astrogeorgeonethree/Starred - https://github.com/Atem1988/Starred - https://github.com/Awrrays/FrameVul - https://github.com/CLincat/vulcat - https://github.com/CVEDB/PoC-List - https://github.com/CVEDB/awesome-cve-repo - https://github.com/CVEDB/top - https://github.com/CYJoe-Cyclone/Awesome-CobaltStrike - https://github.com/DSO-Lab/pocscan - https://github.com/Danny-LLi/CVE-2020-14882 - https://github.com/EdgeSecurityTeam/Vulnerability - https://github.com/Elsfa7-110/kenzer-templates - https://github.com/ExpLangcn/HVVExploitApply_POC - https://github.com/FDlucifer/firece-fish - https://github.com/GGyao/CVE-2020-14882_ALL - https://github.com/GGyao/CVE-2020-14882_POC - https://github.com/GhostTroops/TOP - https://github.com/Hatcat123/my_stars - https://github.com/HimmelAward/Goby_POC - https://github.com/JERRY123S/all-poc - https://github.com/Jean-Francois-C/Windows-Penetration-Testing - https://github.com/KatherineHuangg/metasploit-POC - https://github.com/KimJun1010/WeblogicTool - https://github.com/LucasPDiniz/CVE-2020-14882 - https://github.com/LucasPDiniz/StudyRoom - https://github.com/MacAsure/WL_Scan_GO - https://github.com/Manor99/CVE-2020-14882- - https://github.com/MicahFleming/Risk-Assessment-Cap-Stone- - https://github.com/MichaelKoczwara/Awesome-CobaltStrike-Defence - https://github.com/Mr-xn/Penetration_Testing_POC - https://github.com/N0Coriander/CVE-2020-14882-14883 - https://github.com/NS-Sp4ce/CVE-2020-14882 - https://github.com/NetW0rK1le3r/awesome-hacking-lists - https://github.com/Ormicron/CVE-2020-14882-GUI-Test - https://github.com/Ostorlab/KEV - https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors - https://github.com/QmF0c3UK/CVE-2020-14882 - https://github.com/Serendipity-Lucky/CVE-2020-14882_ALL - https://github.com/SexyBeast233/SecBooks - https://github.com/Singhsanjeev617/A-Red-Teamer-diaries - https://github.com/SouthWind0/southwind0.github.io - https://github.com/Threekiii/Awesome-Exploit - https://github.com/Threekiii/Awesome-POC - https://github.com/Threekiii/Vulhub-Reproduce - https://github.com/Umarovm/-Patched-McMaster-University-Blind-Command-Injection - https://github.com/Weik1/Artillery - https://github.com/XTeam-Wing/CVE-2020-14882 - https://github.com/XTeam-Wing/RedTeaming2020 - https://github.com/Yang0615777/PocList - https://github.com/Z0fhack/Goby_POC - https://github.com/Zero094/Vulnerability-verification - https://github.com/adm1in/CodeTest - https://github.com/aiici/weblogicAllinone - https://github.com/alexfrancow/CVE-2020-14882 - https://github.com/alphaSeclab/sec-daily-2020 - https://github.com/amcai/myscan - https://github.com/apachecn-archive/Middleware-Vulnerability-detection - https://github.com/awake1t/Awesome-hacking-tools - https://github.com/aymankhder/Windows-Penetration-Testing - https://github.com/bakery312/Vulhub-Reproduce - https://github.com/bhassani/Recent-CVE - https://github.com/bhdresh/SnortRules - https://github.com/bigblackhat/oFx - https://github.com/blackend/Diario-RedTem - https://github.com/bonjourmalware/melody - https://github.com/c04tl/WebLogic-Handle-RCE-Scanner - https://github.com/co-devs/cve-otx-lookup - https://github.com/corelight/CVE-2020-14882-weblogicRCE - https://github.com/cri1wa/MemShell - https://github.com/cvebase/cvebase-wiki - https://github.com/cyberanand1337x/bug-bounty-2022 - https://github.com/d4n-sec/d4n-sec.github.io - https://github.com/daehee/nvd - https://github.com/developer3000S/PoC-in-GitHub - https://github.com/djytmdj/Tool_Summary - https://github.com/exploitblizzard/CVE-2020-14882-WebLogic - https://github.com/fei9747/Awesome-CobaltStrike - https://github.com/ferreirasc/redteam-arsenal - https://github.com/forhub2021/weblogicScanner - https://github.com/hanc00l/some_pocsuite - https://github.com/hectorgie/PoC-in-GitHub - https://github.com/hktalent/TOP - https://github.com/hktalent/bug-bounty - https://github.com/huike007/penetration_poc - https://github.com/iceberg-N/WL_Scan_GO - https://github.com/ihebski/A-Red-Teamer-diaries - https://github.com/jas502n/CVE-2020-14882 - https://github.com/jbmihoub/all-poc - https://github.com/jcabrale/Melody - https://github.com/jeansgit/Pentest - https://github.com/john-automates/Bsides_2023_Resources - https://github.com/kalikaneko/unvd - https://github.com/kk98kk0/CVE-2020-14882 - https://github.com/koala2099/GitHub-Chinese-Top-Charts - https://github.com/koutto/jok3r-pocs - https://github.com/langu-xyz/JavaVulnMap - https://github.com/leoambrus/CheckersNomisec - https://github.com/lions2012/Penetration_Testing_POC - https://github.com/lolminerxmrig/CVE-2020-14882_ALL - https://github.com/lolminerxmrig/Capricornus - https://github.com/lovechinacoco/https-github.com-mai-lang-chai-Middleware-Vulnerability-detection - https://github.com/ludy-dev/Weblogic_Unauthorized-bypass-RCE - https://github.com/merlinepedra/nuclei-templates - https://github.com/merlinepedra25/nuclei-templates - https://github.com/milo2012/CVE-2020-14882 - https://github.com/mmioimm/cve-2020-14882 - https://github.com/murataydemir/CVE-2020-14882 - https://github.com/murataydemir/CVE-2020-14883 - https://github.com/neilzhang1/Chinese-Charts - https://github.com/netveil/Awesome-List - https://github.com/nice0e3/CVE-2020-14882_Exploit_Gui - https://github.com/nik0nz7/CVE-2020-14882 - https://github.com/niudaii/go-crack - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/openx-org/BLEN - https://github.com/ovProphet/CVE-2020-14882-checker - https://github.com/pen4uin/awesome-vulnerability-research - https://github.com/pen4uin/vulnerability-research - https://github.com/pen4uin/vulnerability-research-list - https://github.com/pit-lock/hacking - https://github.com/pprietosanchez/CVE-2020-14750 - https://github.com/puckiestyle/A-Red-Teamer-diaries - https://github.com/pwn3z/CVE-2020-14882-WebLogic - https://github.com/qeeqbox/falcon - https://github.com/qi4L/WeblogicScan.go - https://github.com/qianniaoge/CVE-2020-14882_Exploit_Gui - https://github.com/qingyuanfeiniao/Chinese-Top-Charts - https://github.com/r0eXpeR/redteam_vul - https://github.com/readloud/Awesome-Stars - https://github.com/reph0r/poc-exp - https://github.com/reph0r/poc-exp-tools - https://github.com/s1kr10s/CVE-2020-14882 - https://github.com/sobinge/nuclei-templates - https://github.com/soosmile/POC - https://github.com/sp4zcmd/WeblogicExploit-GUI - https://github.com/superfish9/pt - https://github.com/trganda/starrlist - https://github.com/tufanturhan/Red-Teamer-Diaries - https://github.com/tzwlhack/Vulnerability - https://github.com/veo/vscan - https://github.com/weeka10/-hktalent-TOP - https://github.com/whoadmin/pocs - https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC- - https://github.com/wr0x00/Lizard - https://github.com/wr0x00/Lsploit - https://github.com/wsfengfan/cve-2020-14882 - https://github.com/wuzuowei/nice-scripts - https://github.com/xMr110/CVE-2020-14882 - https://github.com/xfiftyone/CVE-2020-14882 - https://github.com/xiaoyaovo/2021SecWinterTask - https://github.com/xinyisleep/pocscan - https://github.com/xuetusummer/Penetration_Testing_POC - https://github.com/yaklang/vulinone - https://github.com/yhy0/ExpDemo-JavaFX - https://github.com/yichensec/Bug_writer - https://github.com/yyzsec/2021SecWinterTask - https://github.com/zer0yu/Awesome-CobaltStrike - https://github.com/zhzyker/exphub - https://github.com/zhzyker/vulmap - https://github.com/zoroqi/my-awesome