mirror of
https://github.com/0xMarcio/cve.git
synced 2025-06-19 17:30:12 +00:00
6.5 KiB
6.5 KiB
CVE-2020-2883
Description
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via IIOP, T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
POC
Reference
- http://packetstormsecurity.com/files/157950/WebLogic-Server-Deserialization-Remote-Code-Execution.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
Github
- https://github.com/0x727/JNDIExploit
- https://github.com/0xMarcio/cve
- https://github.com/0xT11/CVE-POC
- https://github.com/0xdu/WLExploit
- https://github.com/0xn0ne/weblogicScanner
- https://github.com/20142995/sectool
- https://github.com/2lambda123/JNDIExploit
- https://github.com/ARPSyndicate/cvemon
- https://github.com/AabyssZG/AWD-Guide
- https://github.com/AdeliaNitzsche/Java-Deserialization-Cheat-Sheet
- https://github.com/Al1ex/CVE-2020-2883
- https://github.com/BigFatBobbb/JDDIExploit
- https://github.com/BrittanyKuhn/javascript-tutorial
- https://github.com/CVEDB/PoC-List
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/CVEDB/top
- https://github.com/CnHack3r/Penetration_PoC
- https://github.com/DaBoQuan/CVE-2020-14645
- https://github.com/Dviros/log4shell-possible-malware
- https://github.com/EchoGin404/-
- https://github.com/EchoGin404/gongkaishouji
- https://github.com/FancyDoesSecurity/CVE-2020-2883
- https://github.com/FoolMitAh/WeblogicScan
- https://github.com/FreeK0x00/JNDIExploitPlus
- https://github.com/GhostTroops/TOP
- https://github.com/Ghostasky/ALLStarRepo
- https://github.com/GrrrDog/Java-Deserialization-Cheat-Sheet
- https://github.com/Hatcat123/my_stars
- https://github.com/Hypdncy/JNDIBypassExploit
- https://github.com/I7Z3R0/Log4j
- https://github.com/Ivan1ee/weblogic-framework
- https://github.com/JERRY123S/all-poc
- https://github.com/Jeromeyoung/JNDIExploit-1
- https://github.com/KimJun1010/WeblogicTool
- https://github.com/Live-Hack-CVE/CVE-2020-2883
- https://github.com/LucasPDiniz/CVE-2020-14882
- https://github.com/MacAsure/WL_Scan_GO
- https://github.com/MagicZer0/Weblogic_CVE-2020-2883_POC
- https://github.com/Mr-xn/JNDIExploit-1
- https://github.com/Mr-xn/Penetration_Testing_POC
- https://github.com/NetW0rK1le3r/awesome-hacking-lists
- https://github.com/PalindromeLabs/Java-Deserialization-CVEs
- https://github.com/Qynklee/POC_CVE-2020-2883
- https://github.com/SexyBeast233/SecBooks
- https://github.com/Shadowven/Vulnerability_Reproduction
- https://github.com/Tyro-Shan/gongkaishouji
- https://github.com/Weik1/Artillery
- https://github.com/WhiteHSBG/JNDIExploit
- https://github.com/Y4er/CVE-2020-2883
- https://github.com/Y4er/WebLogic-Shiro-shell
- https://github.com/YIXINSHUWU/Penetration_Testing_POC
- https://github.com/ZTK-009/Penetration_PoC
- https://github.com/ZZZWD/CVE-2020-2883
- https://github.com/aHlo666/JNDIExploit
- https://github.com/alphaSeclab/sec-daily-2020
- https://github.com/amcai/myscan
- https://github.com/cyberanand1337x/bug-bounty-2022
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/dream0x01/weblogic-framework
- https://github.com/forhub2021/weblogicScanner
- https://github.com/gobysec/Weblogic
- https://github.com/hasee2018/Penetration_Testing_POC
- https://github.com/hectorgie/PoC-in-GitHub
- https://github.com/hktalent/CVE_2020_2546
- https://github.com/hktalent/TOP
- https://github.com/hktalent/bug-bounty
- https://github.com/huan-cdm/secure_tools_link
- https://github.com/huike007/penetration_poc
- https://github.com/huike007/poc
- https://github.com/hungslab/awd-tools
- https://github.com/iceberg-N/WL_Scan_GO
- https://github.com/jbmihoub/all-poc
- https://github.com/kenyon-wong/JNDIExploit
- https://github.com/koala2099/GitHub-Chinese-Top-Charts
- https://github.com/koutto/jok3r-pocs
- https://github.com/lions2012/Penetration_Testing_POC
- https://github.com/lucy9x/WLExploit
- https://github.com/mickhuu/jndi_tool
- https://github.com/mishmashclone/GrrrDog-Java-Deserialization-Cheat-Sheet
- https://github.com/mofang1104/weblogic-framework
- https://github.com/neilzhang1/Chinese-Charts
- https://github.com/netveil/Awesome-List
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/onewinner/VulToolsKit
- https://github.com/password520/Penetration_PoC
- https://github.com/pentration/gongkaishouji
- https://github.com/pinkieli/GitHub-Chinese-Top-Charts
- https://github.com/qi4L/WeblogicScan.go
- https://github.com/qingyuanfeiniao/Chinese-Top-Charts
- https://github.com/readloud/Awesome-Stars
- https://github.com/safe6Sec/wlsEnv
- https://github.com/samjcs/log4shell-possible-malware
- https://github.com/shadowsock5/JNDIExploit
- https://github.com/shengshengli/weblogic-framework
- https://github.com/soosmile/POC
- https://github.com/sp4zcmd/WeblogicExploit-GUI
- https://github.com/superlink996/chunqiuyunjingbachang
- https://github.com/sv3nbeast/weblogic-framework
- https://github.com/taielab/awesome-hacking-lists
- https://github.com/tovd-go/Weblogic_GadGet
- https://github.com/veo/vscan
- https://github.com/weeka10/-hktalent-TOP
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
- https://github.com/wr0x00/Lizard
- https://github.com/wr0x00/Lsploit
- https://github.com/wukong-bin/weblogicpoc
- https://github.com/wzqawp/weblogic-framework
- https://github.com/xbl2022/awesome-hacking-lists
- https://github.com/xuetusummer/Penetration_Testing_POC
- https://github.com/yedada-wei/-
- https://github.com/yedada-wei/gongkaishouji
- https://github.com/zhaojunliing/awesome-stars
- https://github.com/zhzyker/exphub
- https://github.com/zhzyker/vulmap
- https://github.com/zoroqi/my-awesome
- https://github.com/zzwlpx/weblogicPoc