Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-14882 PoC — Oracle WebLogic Server 安全漏洞

Source
Associated Vulnerability
Title:Oracle WebLogic Server 安全漏洞 (CVE-2020-14882)
Description:Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Console). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
Description
Detection of RCE in Oracle's WebLogic Server CVE-2020-14882 / CVE-2020-14750
Readme
# Detection of RCE in Oracle's "WebLogic Server" CVE-2020-14882 / CVE-2020-14750

## Summary:  
Detection of attempts to exploit CVE-2020-14882 and CVE-2020-14750 - Unauthenticated RCE in Oracle's Weblogic Server.

## References: 
Oracle's advisories:    
- CVE-2020-14882 https://www.oracle.com/security-alerts/cpuoct2020traditional.html  
- CVE-2020-14750 https://www.oracle.com/security-alerts/alert-cve-2020-14750.html  

Exploit PoC (in Vietnamese):  
- https://testbnull.medium.com/weblogic-rce-by-only-one-get-request-cve-2020-14882-analysis-6e4b09981dbf  
Exploit PoC video:  
- https://youtu.be/JFVDOIL0YtA  

Vendor write-ups including exploitation in the wild:  
- https://isc.sans.edu/forums/diary/PATCH+NOW+CVE202014882+Weblogic+Actively+Exploited+Against+Honeypots/26734/   
- https://isc.sans.edu/forums/diary/Cryptojacking+Targeting+WebLogic+TCP7001/26768/
- https://blog.rapid7.com/2020/10/29/oracle-weblogic-unauthenticated-complete-takeover-cve-2020-14882-what-you-need-to-know/  
- https://threatpost.com/oracle-update-weblogic-server-flaw/160889/  

## Notices raised:   

|Detection scope|notice msg|notice sub field|Fidelity of alert|
|-|-|-|-|
|POST method successful exploit|Potentially successful exploit of Oracle's WebLogic Server Remote Code Execution vulnerability (CVE-2020-14882 and CVE-2020-14750) using POST method. Refer to https://www.oracle.com/security-alerts/cpuoct2020traditional.html and https://www.oracle.com/security-alerts/alert-cve-2020-14750.html. See sub field for artifacts.|[REDACTED due to TLP of source pcap]|HIGH|
|GET method successful exploit|Potentially successful exploit of Oracle's WebLogic Server Remote Code Execution vulnerability (CVE-2020-14882 and CVE-2020-14750) using GET method. Refer to https://www.oracle.com/security-alerts/cpuoct2020traditional.html and https://www.oracle.com/security-alerts/alert-cve-2020-14750.html. See sub field for artifacts.|[REDACTED due to TLP of source pcap]|HIGH|
|POST method unsuccessful attempt|Unsuccessful exploit attempt of Oracle's WebLogic Server Remote Code Execution vulnerability (CVE-2020-14882 and CVE-2020-14750) using POST method. Refer to https://www.oracle.com/security-alerts/cpuoct2020traditional.html and https://www.oracle.com/security-alerts/alert-cve-2020-14750.html. See sub field for artifacts.|[REDACTED due to TLP of source pcap]|HIGH|
|GET method unsuccessful attempt|Unsuccessful exploit attempt of Oracle's WebLogic Server Remote Code Execution vulnerability (CVE-2020-14882 and CVE-2020-14750) using GET method. Refer to https://www.oracle.com/security-alerts/cpuoct2020traditional.html and https://www.oracle.com/security-alerts/alert-cve-2020-14750.html. See sub field for artifacts.|[REDACTED due to TLP of source pcap]|HIGH|


## Usage, notes and recommendations:

- This package can include a sample of the Server's response in the notice. This is to assist incident responders triage the detection. 
If you wish to have the server response artifacts included in your notice.log, change this option in scripts/main.zeek from the default `F` to `T` like so:    
``const include_exploited_server_response_in_notice: bool = T;``

- By default this package detects on all TCP ports, not just the default port 7001/tcp. To change the behavior to only detect on the specified port, use these options in scripts/main.zeek:  
`const detect_default_port_only: bool = T;`   
`const default_port: port = 7001/tcp;`  

- By default this package detects ALL exploit attempts - successful and unsuccessful. To change the behavior to only detect successful exploits, use these options in scripts/main.zeek:      
`const detect_unsuccessful_attempts: bool = F;`

- If you have scanners that you wish to exclude from detection, add them to the scripts/scanner_exclude_from_detection.zeek file.

- To run against a pcap you already have ```zeek -Cr your.pcap scripts/__load__.zeek```   

- This package will run in clustered or non clustered environments.   

## Feedback
- As details emerge, we are keen to improve this package for the benefit of the community, please feel free to contact the author with any suggestions and feedback.
File Snapshot

[4.0K] /data/pocs/4c35a8627c33bc2e8d074fe94318ae8658d5422e ├── [ 178] bro-pkg.meta ├── [1.5K] LICENSE ├── [4.1K] README.md ├── [4.0K] scripts │   ├── [ 62] __load__.zeek │   ├── [7.5K] main.zeek │   └── [ 186] scanner_exclude_from_detection.zeek └── [ 178] zkg.meta 1 directory, 7 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →