mirror of
https://github.com/0xMarcio/cve.git
synced 2025-06-19 17:30:12 +00:00
8.5 KiB
8.5 KiB
CVE-2020-2555
Description
Vulnerability in the Oracle Coherence product of Oracle Fusion Middleware (component: Caching,CacheStore,Invocation). Supported versions that are affected are 3.7.1.0, 12.1.3.0.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3 to compromise Oracle Coherence. Successful attacks of this vulnerability can result in takeover of Oracle Coherence. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
POC
Reference
- http://packetstormsecurity.com/files/157054/Oracle-Coherence-Fusion-Middleware-Remote-Code-Execution.html
- http://packetstormsecurity.com/files/157207/Oracle-WebLogic-Server-12.2.1.4.0-Remote-Code-Execution.html
- http://packetstormsecurity.com/files/157795/WebLogic-Server-Deserialization-Remote-Code-Execution.html
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpujul2021.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
Github
- https://github.com/0x727/JNDIExploit
- https://github.com/0xMarcio/cve
- https://github.com/0xT11/CVE-POC
- https://github.com/0xn0ne/weblogicScanner
- https://github.com/20142995/Goby
- https://github.com/20142995/pocsuite3
- https://github.com/20142995/sectool
- https://github.com/2lambda123/CVE-mitre
- https://github.com/2lambda123/JNDIExploit
- https://github.com/2lambda123/Windows10Exploits
- https://github.com/5l1v3r1/CVE-2020-2556
- https://github.com/ARPSyndicate/cvemon
- https://github.com/AabyssZG/AWD-Guide
- https://github.com/AdeliaNitzsche/Java-Deserialization-Cheat-Sheet
- https://github.com/BigFatBobbb/JDDIExploit
- https://github.com/BrittanyKuhn/javascript-tutorial
- https://github.com/CVEDB/PoC-List
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/CVEDB/top
- https://github.com/CnHack3r/Penetration_PoC
- https://github.com/Dviros/log4shell-possible-malware
- https://github.com/EchoGin404/-
- https://github.com/EchoGin404/gongkaishouji
- https://github.com/FreeK0x00/JNDIExploitPlus
- https://github.com/GhostTroops/TOP
- https://github.com/GrrrDog/Java-Deserialization-Cheat-Sheet
- https://github.com/Hatcat123/my_stars
- https://github.com/HimmelAward/Goby_POC
- https://github.com/Hpd0ger/weblogic_hpcmd
- https://github.com/Hu3sky/CVE-2020-2555
- https://github.com/Hypdncy/JNDIBypassExploit
- https://github.com/I7Z3R0/Log4j
- https://github.com/Ivan1ee/weblogic-framework
- https://github.com/JERRY123S/all-poc
- https://github.com/Jeromeyoung/JNDIExploit-1
- https://github.com/KimJun1010/WeblogicTool
- https://github.com/Live-Hack-CVE/CVE-2020-2555
- https://github.com/LucasPDiniz/CVE-2020-14882
- https://github.com/MacAsure/WL_Scan_GO
- https://github.com/Maskhe/cve-2020-2555
- https://github.com/MelanyRoob/Goby
- https://github.com/Mr-xn/JNDIExploit-1
- https://github.com/Mr-xn/Penetration_Testing_POC
- https://github.com/NetW0rK1le3r/awesome-hacking-lists
- https://github.com/Offensive-Penetration-Security/OPSEC-Hall-of-fame
- https://github.com/Ostorlab/KEV
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
- https://github.com/PalindromeLabs/Java-Deserialization-CVEs
- https://github.com/Qynklee/POC_CVE-2020-2555
- https://github.com/Qynklee/POC_CVE-2020-2883
- https://github.com/R0ser1/GadgetInspector
- https://github.com/SexyBeast233/SecBooks
- https://github.com/TacticsTeam/sg_ysoserial
- https://github.com/TrojanAZhen/Self_Back
- https://github.com/Tyro-Shan/gongkaishouji
- https://github.com/Uvemode/CVE-2020-2555
- https://github.com/Weik1/Artillery
- https://github.com/WhiteHSBG/JNDIExploit
- https://github.com/Y4er/CVE-2020-14756
- https://github.com/Y4er/CVE-2020-2555
- https://github.com/Y4er/CVE-2020-2883
- https://github.com/Y4er/WebLogic-Shiro-shell
- https://github.com/YIXINSHUWU/Penetration_Testing_POC
- https://github.com/Z0fhack/Goby_POC
- https://github.com/ZTK-009/Penetration_PoC
- https://github.com/aHlo666/JNDIExploit
- https://github.com/adm1in/CodeTest
- https://github.com/alphaSeclab/sec-daily-2020
- https://github.com/amcai/myscan
- https://github.com/apachecn-archive/Middleware-Vulnerability-detection
- https://github.com/awsassets/weblogic_exploit
- https://github.com/bhassani/Recent-CVE
- https://github.com/cyberanand1337x/bug-bounty-2022
- https://github.com/d4n-sec/d4n-sec.github.io
- https://github.com/dbierer/php-sec-update
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/dream0x01/weblogic-framework
- https://github.com/feihong-cs/Attacking_Shiro_with_CVE_2020_2555
- https://github.com/forhub2021/weblogicScanner
- https://github.com/gobysec/Goby
- https://github.com/gobysec/Weblogic
- https://github.com/hasee2018/Penetration_Testing_POC
- https://github.com/hectorgie/PoC-in-GitHub
- https://github.com/hktalent/CVE_2020_2546
- https://github.com/hktalent/TOP
- https://github.com/hktalent/bug-bounty
- https://github.com/huan-cdm/secure_tools_link
- https://github.com/huike007/penetration_poc
- https://github.com/huike007/poc
- https://github.com/hungslab/awd-tools
- https://github.com/iceberg-N/WL_Scan_GO
- https://github.com/jbmihoub/all-poc
- https://github.com/kenyon-wong/JNDIExploit
- https://github.com/koala2099/GitHub-Chinese-Top-Charts
- https://github.com/koutto/jok3r-pocs
- https://github.com/langu-xyz/JavaVulnMap
- https://github.com/lions2012/Penetration_Testing_POC
- https://github.com/lnick2023/nicenice
- https://github.com/lovechinacoco/https-github.com-mai-lang-chai-Middleware-Vulnerability-detection
- https://github.com/mickhuu/jndi_tool
- https://github.com/mishmashclone/GrrrDog-Java-Deserialization-Cheat-Sheet
- https://github.com/mofang1104/weblogic-framework
- https://github.com/neilzhang1/Chinese-Charts
- https://github.com/netveil/Awesome-List
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/nu11secur1ty/CVE-mitre
- https://github.com/nu11secur1ty/CVE-nu11secur1ty
- https://github.com/nu11secur1ty/Windows10Exploits
- https://github.com/onewinner/VulToolsKit
- https://github.com/password520/Penetration_PoC
- https://github.com/pentration/gongkaishouji
- https://github.com/pinkieli/GitHub-Chinese-Top-Charts
- https://github.com/qazbnm456/awesome-cve-poc
- https://github.com/qi4L/WeblogicScan.go
- https://github.com/qingyuanfeiniao/Chinese-Top-Charts
- https://github.com/raystyle/paper
- https://github.com/readloud/Awesome-Stars
- https://github.com/retr0-13/Goby
- https://github.com/safe6Sec/WeblogicVuln
- https://github.com/safe6Sec/wlsEnv
- https://github.com/samjcs/log4shell-possible-malware
- https://github.com/shadowsock5/JNDIExploit
- https://github.com/shengshengli/weblogic-framework
- https://github.com/soosmile/POC
- https://github.com/sp4zcmd/WeblogicExploit-GUI
- https://github.com/sv3nbeast/weblogic-framework
- https://github.com/taielab/awesome-hacking-lists
- https://github.com/tdtc7/qps
- https://github.com/tovd-go/Weblogic_GadGet
- https://github.com/weeka10/-hktalent-TOP
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
- https://github.com/wr0x00/Lizard
- https://github.com/wr0x00/Lsploit
- https://github.com/wsfengfan/CVE-2020-2555
- https://github.com/wukong-bin/weblogicpoc
- https://github.com/wzqawp/weblogic-framework
- https://github.com/xbl2022/awesome-hacking-lists
- https://github.com/xbl3/awesome-cve-poc_qazbnm456
- https://github.com/xuetusummer/Penetration_Testing_POC
- https://github.com/yedada-wei/-
- https://github.com/yedada-wei/gongkaishouji
- https://github.com/zhaojunliing/awesome-stars
- https://github.com/zhzyker/exphub
- https://github.com/zhzyker/vulmap
- https://github.com/zoroqi/my-awesome
- https://github.com/zzwlpx/weblogicPoc