Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-14883 PoC — Oracle WebLogic Server 安全漏洞

Source
Associated Vulnerability
Title:Oracle WebLogic Server 安全漏洞 (CVE-2020-14883)
Description:Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Console). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 7.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).
Description
用于对WebLogic(10.3.6.0.0 ;12.1.3.0.0 ;12.2.1.3.0; 12.2.1.4.0 ;14.1.1.0.0)进行验证及利用
Readme
# CVE-2020-14883EXP
用于对WebLogic(10.3.6.0.0 ;12.1.3.0.0 ;12.2.1.3.0; 12.2.1.4.0 ;14.1.1.0.0)进行验证及利用,请勿用于非法用途。
键入IP+端口即可开始验证(e.g 127.0.0.1:7001)
支持远程xml命令执行
10.3.6.0.0外的其他版本提供两种利用方式
验证成功即可进入命令模式
批量验证成功会自动保存


File Snapshot

[4.0K] /data/pocs/d94d27dea10dcf9c6bb04d464c42a3ea9a1a4883 ├── [ 11K] function.py ├── [ 75] ips.txt ├── [ 13K] main.py ├── [4.0K] __pycache__ │   ├── [1.5K] fa_bao.cpython-38.pyc │   └── [6.3K] function.cpython-38.pyc ├── [ 359] README.md └── [ 66] test.py 1 directory, 7 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →