vendor:
WebLogic Server
by:
Nguyen Jang
9.8
CVSS
HIGH
Unauthenticated RCE
78
CWE
Product Name: WebLogic Server
Affected Version From: 10.3.6.0.0
Affected Version To: 14.1.1.0.0
Patch Exists: YES
Related CWE: CVE-2020-14882
CPE: a:oracle:weblogic_server
Metasploit:
https://www.rapid7.com/db/vulnerabilities/oracle-weblogic-cve-2020-14882/, https://www.rapid7.com/db/vulnerabilities/alma_linux-cve-2018-14882/, https://www.rapid7.com/db/vulnerabilities/centos_linux-cve-2018-14882/, https://www.rapid7.com/db/vulnerabilities/redhat_linux-cve-2018-14882/, https://www.rapid7.com/db/vulnerabilities/oracle_linux-cve-2018-14882/
Other Scripts:
N/A
Platforms Tested: Windows, Linux, Mac
2020
Oracle WebLogic Server 10.3.6.0.0 / 12.1.3.0.0 / 12.2.1.3.0 / 12.2.1.4.0 / 14.1.1.0.0 – Unauthenticated RCE via GET request
This exploit allows an attacker to execute arbitrary commands on a vulnerable Oracle WebLogic Server instance via a GET request. The exploit works by sending a specially crafted request to the server, which contains a malicious payload that is executed by the server. The payload is a Java expression that is evaluated by the server and executed as a command.
Mitigation:
Oracle has released a patch for this vulnerability. It is recommended to apply the patch as soon as possible.