mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-06 10:41:43 +00:00
9.4 KiB
9.4 KiB
CVE-2020-14882
Description
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Console). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
POC
Reference
- http://packetstormsecurity.com/files/159769/Oracle-WebLogic-Server-Remote-Code-Execution.html
- http://packetstormsecurity.com/files/160143/Oracle-WebLogic-Server-Administration-Console-Handle-Remote-Code-Execution.html
- http://packetstormsecurity.com/files/161128/Oracle-WebLogic-Server-12.2.1.0-Remote-Code-Execution.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
Github
- https://github.com/0day666/Vulnerability-verification
- https://github.com/0thm4n3/cve-2020-14882
- https://github.com/0x783kb/Security-operation-book
- https://github.com/0xMrNiko/Awesome-Red-Teaming
- https://github.com/0xn0ne/weblogicScanner
- https://github.com/1n7erface/PocList
- https://github.com/20142995/pocsuite3
- https://github.com/20142995/sectool
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ARPSyndicate/kenzer-templates
- https://github.com/Ares-X/VulWiki
- https://github.com/Astrogeorgeonethree/Starred
- https://github.com/Atem1988/Starred
- https://github.com/Awrrays/FrameVul
- https://github.com/CLincat/vulcat
- https://github.com/CVEDB/PoC-List
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/CVEDB/top
- https://github.com/CYJoe-Cyclone/Awesome-CobaltStrike
- https://github.com/DSO-Lab/pocscan
- https://github.com/Danny-LLi/CVE-2020-14882
- https://github.com/EdgeSecurityTeam/Vulnerability
- https://github.com/Elsfa7-110/kenzer-templates
- https://github.com/ExpLangcn/HVVExploitApply_POC
- https://github.com/FDlucifer/firece-fish
- https://github.com/GGyao/CVE-2020-14882_ALL
- https://github.com/GGyao/CVE-2020-14882_POC
- https://github.com/GhostTroops/TOP
- https://github.com/Hatcat123/my_stars
- https://github.com/HimmelAward/Goby_POC
- https://github.com/JERRY123S/all-poc
- https://github.com/Jean-Francois-C/Windows-Penetration-Testing
- https://github.com/KatherineHuangg/metasploit-POC
- https://github.com/KimJun1010/WeblogicTool
- https://github.com/LucasPDiniz/CVE-2020-14882
- https://github.com/LucasPDiniz/StudyRoom
- https://github.com/MacAsure/WL_Scan_GO
- https://github.com/Manor99/CVE-2020-14882-
- https://github.com/MicahFleming/Risk-Assessment-Cap-Stone-
- https://github.com/MichaelKoczwara/Awesome-CobaltStrike-Defence
- https://github.com/Mr-xn/Penetration_Testing_POC
- https://github.com/N0Coriander/CVE-2020-14882-14883
- https://github.com/NS-Sp4ce/CVE-2020-14882
- https://github.com/NetW0rK1le3r/awesome-hacking-lists
- https://github.com/Ormicron/CVE-2020-14882-GUI-Test
- https://github.com/Ostorlab/KEV
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
- https://github.com/QmF0c3UK/CVE-2020-14882
- https://github.com/Serendipity-Lucky/CVE-2020-14882_ALL
- https://github.com/SexyBeast233/SecBooks
- https://github.com/Singhsanjeev617/A-Red-Teamer-diaries
- https://github.com/SouthWind0/southwind0.github.io
- https://github.com/Threekiii/Awesome-Exploit
- https://github.com/Threekiii/Awesome-POC
- https://github.com/Threekiii/Vulhub-Reproduce
- https://github.com/Umarovm/-Patched-McMaster-University-Blind-Command-Injection
- https://github.com/Weik1/Artillery
- https://github.com/XTeam-Wing/CVE-2020-14882
- https://github.com/XTeam-Wing/RedTeaming2020
- https://github.com/Yang0615777/PocList
- https://github.com/Z0fhack/Goby_POC
- https://github.com/Zero094/Vulnerability-verification
- https://github.com/adm1in/CodeTest
- https://github.com/aiici/weblogicAllinone
- https://github.com/alexfrancow/CVE-2020-14882
- https://github.com/alphaSeclab/sec-daily-2020
- https://github.com/amcai/myscan
- https://github.com/apachecn-archive/Middleware-Vulnerability-detection
- https://github.com/awake1t/Awesome-hacking-tools
- https://github.com/aymankhder/Windows-Penetration-Testing
- https://github.com/bakery312/Vulhub-Reproduce
- https://github.com/bhassani/Recent-CVE
- https://github.com/bhdresh/SnortRules
- https://github.com/bigblackhat/oFx
- https://github.com/blackend/Diario-RedTem
- https://github.com/bonjourmalware/melody
- https://github.com/c04tl/WebLogic-Handle-RCE-Scanner
- https://github.com/co-devs/cve-otx-lookup
- https://github.com/corelight/CVE-2020-14882-weblogicRCE
- https://github.com/cri1wa/MemShell
- https://github.com/cvebase/cvebase-wiki
- https://github.com/cyberanand1337x/bug-bounty-2022
- https://github.com/d4n-sec/d4n-sec.github.io
- https://github.com/daehee/nvd
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/djytmdj/Tool_Summary
- https://github.com/exploitblizzard/CVE-2020-14882-WebLogic
- https://github.com/fei9747/Awesome-CobaltStrike
- https://github.com/ferreirasc/redteam-arsenal
- https://github.com/forhub2021/weblogicScanner
- https://github.com/hanc00l/some_pocsuite
- https://github.com/hectorgie/PoC-in-GitHub
- https://github.com/hktalent/TOP
- https://github.com/hktalent/bug-bounty
- https://github.com/huike007/penetration_poc
- https://github.com/iceberg-N/WL_Scan_GO
- https://github.com/ihebski/A-Red-Teamer-diaries
- https://github.com/jas502n/CVE-2020-14882
- https://github.com/jbmihoub/all-poc
- https://github.com/jcabrale/Melody
- https://github.com/jeansgit/Pentest
- https://github.com/john-automates/Bsides_2023_Resources
- https://github.com/kalikaneko/unvd
- https://github.com/kk98kk0/CVE-2020-14882
- https://github.com/koala2099/GitHub-Chinese-Top-Charts
- https://github.com/koutto/jok3r-pocs
- https://github.com/langu-xyz/JavaVulnMap
- https://github.com/leoambrus/CheckersNomisec
- https://github.com/lions2012/Penetration_Testing_POC
- https://github.com/lolminerxmrig/CVE-2020-14882_ALL
- https://github.com/lolminerxmrig/Capricornus
- https://github.com/lovechinacoco/https-github.com-mai-lang-chai-Middleware-Vulnerability-detection
- https://github.com/ludy-dev/Weblogic_Unauthorized-bypass-RCE
- https://github.com/merlinepedra/nuclei-templates
- https://github.com/merlinepedra25/nuclei-templates
- https://github.com/milo2012/CVE-2020-14882
- https://github.com/mmioimm/cve-2020-14882
- https://github.com/murataydemir/CVE-2020-14882
- https://github.com/murataydemir/CVE-2020-14883
- https://github.com/neilzhang1/Chinese-Charts
- https://github.com/netveil/Awesome-List
- https://github.com/nice0e3/CVE-2020-14882_Exploit_Gui
- https://github.com/nik0nz7/CVE-2020-14882
- https://github.com/niudaii/go-crack
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/openx-org/BLEN
- https://github.com/ovProphet/CVE-2020-14882-checker
- https://github.com/pen4uin/awesome-vulnerability-research
- https://github.com/pen4uin/vulnerability-research
- https://github.com/pen4uin/vulnerability-research-list
- https://github.com/pit-lock/hacking
- https://github.com/pprietosanchez/CVE-2020-14750
- https://github.com/puckiestyle/A-Red-Teamer-diaries
- https://github.com/pwn3z/CVE-2020-14882-WebLogic
- https://github.com/qeeqbox/falcon
- https://github.com/qi4L/WeblogicScan.go
- https://github.com/qianniaoge/CVE-2020-14882_Exploit_Gui
- https://github.com/qingyuanfeiniao/Chinese-Top-Charts
- https://github.com/r0eXpeR/redteam_vul
- https://github.com/readloud/Awesome-Stars
- https://github.com/reph0r/poc-exp
- https://github.com/reph0r/poc-exp-tools
- https://github.com/s1kr10s/CVE-2020-14882
- https://github.com/sobinge/nuclei-templates
- https://github.com/soosmile/POC
- https://github.com/sp4zcmd/WeblogicExploit-GUI
- https://github.com/superfish9/pt
- https://github.com/trganda/starrlist
- https://github.com/tufanturhan/Red-Teamer-Diaries
- https://github.com/tzwlhack/Vulnerability
- https://github.com/veo/vscan
- https://github.com/weeka10/-hktalent-TOP
- https://github.com/whoadmin/pocs
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
- https://github.com/wr0x00/Lizard
- https://github.com/wr0x00/Lsploit
- https://github.com/wsfengfan/cve-2020-14882
- https://github.com/wuzuowei/nice-scripts
- https://github.com/xMr110/CVE-2020-14882
- https://github.com/xfiftyone/CVE-2020-14882
- https://github.com/xiaoyaovo/2021SecWinterTask
- https://github.com/xinyisleep/pocscan
- https://github.com/xuetusummer/Penetration_Testing_POC
- https://github.com/yaklang/vulinone
- https://github.com/yhy0/ExpDemo-JavaFX
- https://github.com/yichensec/Bug_writer
- https://github.com/yyzsec/2021SecWinterTask
- https://github.com/zer0yu/Awesome-CobaltStrike
- https://github.com/zhzyker/exphub
- https://github.com/zhzyker/vulmap
- https://github.com/zoroqi/my-awesome