vendor:
WebLogic Server
by:
SlidingWindow
7.5
CVSS
HIGH
Java Deserialization Remote Code Execution
1234
CWE
Product Name: WebLogic Server
Affected Version From: 10.3.6.0
Affected Version To: 12.2.1.0
Patch Exists: YES
Related CWE: CVE-2015-4852
CPE: oracle:weblogic_server
Platforms Tested: Oracle WebLogic Server version 10.3.6.0 running on a Docker image Ubuntu 14.04.4 LTS, Trusty Tahr
2017
Oracle WebLogic Server Java Deserialization Remote Code Execution
This exploit tests the target Oracle WebLogic Server for Java Deserialization RCE vulnerability. The ysoserial payload causes the target to send Ping requests to attacking machine. You can monitor ICMP ECHO requests on your attacking machine using TCPDump to know if the exploit was successful. Feel free to modify the payload(chunk2) with that of your choice. Don't worry about modiyfing the payload length each time you change the payload as this script will do it for you on the fly.
Mitigation:
Update to the latest version of Oracle WebLogic Server.