Oracle WebLogic Server - Remote Code Execution
ID: CVE-2020-2551
Severity: critical
Author: dwisiswant0
Tags: cve2020,cve,oracle,weblogic,rce,unauth,kev
Description
Section titled “Description”Oracle WebLogic Server (Oracle Fusion Middleware (component: WLS Core Components) is susceptible to a remote code execution vulnerability. Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 2.2.1.3.0 and 12.2.1.4.0. This easily exploitable vulnerability could allow unauthenticated attackers with network access via IIOP to compromise Oracle WebLogic Server.
YAML Source
Section titled “YAML Source”id: CVE-2020-2551
info: name: Oracle WebLogic Server - Remote Code Execution author: dwisiswant0 severity: critical description: | Oracle WebLogic Server (Oracle Fusion Middleware (component: WLS Core Components) is susceptible to a remote code execution vulnerability. Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 2.2.1.3.0 and 12.2.1.4.0. This easily exploitable vulnerability could allow unauthenticated attackers with network access via IIOP to compromise Oracle WebLogic Server. impact: | Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code on the affected system. remediation: | Apply the latest security patches provided by Oracle to mitigate this vulnerability. reference: - https://github.com/hktalent/CVE-2020-2551 - https://nvd.nist.gov/vuln/detail/CVE-2020-2551 - https://www.oracle.com/security-alerts/cpujan2020.html - https://github.com/neilzhang1/Chinese-Charts - https://github.com/pjgmonteiro/Pentest-tools classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2020-2551 epss-score: 0.97537 epss-percentile: 0.99993 cpe: cpe:2.3:a:oracle:weblogic_server:10.3.6.0.0:*:*:*:*:*:*:* metadata: max-request: 1 vendor: oracle product: weblogic_server shodan-query: - http.title:"oracle peoplesoft sign-in" - product:"oracle weblogic" fofa-query: title="oracle peoplesoft sign-in" google-query: intitle:"oracle peoplesoft sign-in" tags: cve2020,cve,oracle,weblogic,rce,unauth,kev
http: - method: GET path: - "{{BaseURL}}/console/login/LoginForm.jsp"
matchers-condition: and matchers: - type: word part: body words: - "10.3.6.0" - "12.1.3.0" - "12.2.1.3" - "12.2.1.4" condition: or
- type: word part: body words: - "WebLogic"
- type: status status: - 200# digest: 4a0a00473045022001210a9da5e1f4b04d2b4ae1e6ff57de882ab5b9cc9a20bd38a9fc1735ea6ecd022100c66fb60c8c5529515aae4cf29422f4784d2ea44475f9be2c926f6dd54b1c6f8b:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2020/CVE-2020-2551.yaml"