From 82bfc73cecb564dfc534e73e8ceea762815cfff7 Mon Sep 17 00:00:00 2001 From: Noam Rathaus Date: Thu, 11 Mar 2021 17:26:35 +0200 Subject: [PATCH] Put references in the right place --- cves/2020/CVE-2020-14882.yaml | 11 +++++------ 1 file changed, 5 insertions(+), 6 deletions(-) diff --git a/cves/2020/CVE-2020-14882.yaml b/cves/2020/CVE-2020-14882.yaml index 51b8f4192e..bf85230e76 100644 --- a/cves/2020/CVE-2020-14882.yaml +++ b/cves/2020/CVE-2020-14882.yaml @@ -4,7 +4,11 @@ info: name: Oracle WebLogic Server Unauthenticated RCE (and Patch Bypass) author: dwisiswant0 severity: critical - reference: https://testbnull.medium.com/weblogic-rce-by-only-one-get-request-cve-2020-14882-analysis-6e4b09981dbf + reference: + - https://testbnull.medium.com/weblogic-rce-by-only-one-get-request-cve-2020-14882-analysis-6e4b09981dbf + - https://twitter.com/jas502n/status/1321416053050667009 + - https://youtu.be/JFVDOIL0YtA + - https://github.com/jas502n/CVE-2020-14882#eg description: | Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Console). @@ -15,11 +19,6 @@ info: Successful attacks of this vulnerability can result in takeover. tags: cve,cve2020,oracle,rce,weblogic - # References: - # - https://twitter.com/jas502n/status/1321416053050667009 - # - https://youtu.be/JFVDOIL0YtA - # - https://github.com/jas502n/CVE-2020-14882#eg - requests: - payloads: exec: