exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotemultiple
https://www.exploit-db.com/exploits/43924
This Metasploit module exploits a deserialization vulnerability in Oracle WebLogic's wls-wsat component (CVE-2017-10271) by sending a crafted SOAP XML payload to execute arbitrary commands. The exploit leverages Java deserialization via ProcessBuilder to achieve remote code execution on vulnerable WebLogic servers.
Classification
Working Poc 100%
Target:
Oracle WebLogic Server (10.3.6.0.0, 12.1.3.0.0, 12.2.1.1.0, 12.2.1.2.0)
No auth needed
Prerequisites:
Network access to the WebLogic server's wls-wsat endpoint (typically port 7001)
exploitdb
WORKING POC
VERIFIED
by Kevin Kirsche · pythonremotemultiple
https://www.exploit-db.com/exploits/43458
This exploit leverages a deserialization vulnerability in Oracle WebLogic Server's wls-wsat component to achieve remote code execution. It crafts malicious SOAP requests containing serialized Java objects to execute arbitrary commands, supporting both Unix and Windows targets.
Classification
Working Poc 95%
Target:
Oracle WebLogic Server 10.3.6.0.0, 12.1.3.0.0, 12.2.1.1.0, 12.2.1.2.0
No auth needed
Prerequisites:
Network access to the WebLogic Server · Listener set up for reverse shell
exploitdb
WORKING POC
by 1337g · pythonremotemultiple
https://www.exploit-db.com/exploits/43392
This exploit leverages a deserialization vulnerability in Oracle WebLogic Server's WLS-WSAT component to achieve blind remote command execution. It crafts a malicious SOAP request with an XMLDecoder payload to execute arbitrary commands via Java's ProcessBuilder.
Classification
Working Poc 100%
Target:
Oracle WebLogic Server (versions 10.3.6.0, 12.1.3.0, 12.2.1.1, 12.2.1.2)
No auth needed
Prerequisites:
Network access to the WebLogic Server's WLS-WSAT endpoint
github
WRITEUP
3,480 stars
by qazbnm456 · poc
https://github.com/qazbnm456/awesome-cve-poc/tree/master/CVE-2017-10271.md
This repository provides a detailed writeup and references for CVE-2017-10271, a deserialization vulnerability in Oracle WebLogic. It includes links to external PoCs and technical analyses but does not contain functional exploit code itself.
Classification
Writeup 90%
Attack Type
Deserialization
Target:
Oracle WebLogic Server
No auth needed
Prerequisites:
Network access to vulnerable WebLogic instance
nomisec
WORKING POC
506 stars
by shack2 · poc
https://github.com/shack2/javaserializetools
This repository contains a functional exploit tool for CVE-2019-2725, a deserialization vulnerability in Oracle WebLogic Server. The tool includes multiple payloads for different versions of WebLogic and provides a GUI for executing checks and exploits.
Classification
Working Poc 95%
Attack Type
Deserialization
Target:
Oracle WebLogic Server (versions 10.x and 12.x)
No auth needed
Prerequisites:
Network access to the target WebLogic Server · Vulnerable version of WebLogic Server
nomisec
WORKING POC
143 stars
by c0mmand3rOpSec · remote
https://github.com/c0mmand3rOpSec/CVE-2017-10271
This repository contains a functional exploit for CVE-2017-10271, an unauthenticated RCE vulnerability in Oracle WebLogic Server. The exploit leverages XML deserialization via the wls-wsat endpoint to execute arbitrary commands.
Classification
Working Poc 95%
Target:
Oracle WebLogic Server
No auth needed
Prerequisites:
Network access to the WebLogic server · wls-wsat endpoint exposed
nomisec
WORKING POC
128 stars
by kkirsche · remote
https://github.com/kkirsche/CVE-2017-10271
This repository contains a functional exploit for CVE-2017-10271, targeting Oracle WebLogic Server's wls-wsat component via deserialization to achieve remote code execution. The exploit includes payloads for both Unix and Windows targets, along with check functionality to verify vulnerability.
Classification
Working Poc 95%
Target:
Oracle WebLogic Server 10.3.6.0.0, 12.1.3.0.0, 12.2.1.1.0, 12.2.1.2.0
No auth needed
Prerequisites:
Network access to the WebLogic Server's wls-wsat endpoint · Listener setup for reverse shell
nomisec
SUSPICIOUS
114 stars
by 7kbstorm · poc
https://github.com/7kbstorm/WebLogic_CNVD_C2019_48814
The repository contains only a README with a title and an image link, lacking any technical details or exploit code. It appears to be a placeholder or lure for external downloads.
Classification
Suspicious 90%
Target:
Oracle WebLogic
No auth needed
nomisec
WORKING POC
105 stars
by SkyBlueEternal · remote
https://github.com/SkyBlueEternal/CNVD-C-2019-48814-CNNVD-201904-961
This repository contains a functional Python script that exploits CVE-2019-2725, a deserialization vulnerability in Oracle WebLogic Server. The PoC sends a malicious SOAP request to trigger remote code execution via the AsyncResponseService endpoint.
Classification
Working Poc 95%
Target:
Oracle WebLogic Server 10.x, 12.1.3
No auth needed
Prerequisites:
Network access to the WebLogic Server · SOAP endpoint exposed
nomisec
WORKING POC
39 stars
by 1337g · remote
https://github.com/1337g/CVE-2017-10271
This repository contains a functional exploit for CVE-2017-10271, a blind remote command execution vulnerability in Oracle WebLogic Server. The exploit leverages XML deserialization via a crafted SOAP request to execute arbitrary commands on the target system.
Classification
Working Poc 95%
Target:
Oracle WebLogic Server (versions affected by CVE-2017-10271)
No auth needed
Prerequisites:
Network access to the WebLogic Server · Target system must be vulnerable to CVE-2017-10271
nomisec
WORKING POC
33 stars
by Cymmetria · poc
https://github.com/Cymmetria/weblogic_honeypot
This repository contains a low-interaction honeypot designed to detect exploitation attempts of CVE-2017-10271, a remote code execution vulnerability in Oracle WebLogic Server. The honeypot simulates a vulnerable WebLogic server and logs attempts to exploit the vulnerability.
Classification
Working Poc 95%
Target:
Oracle WebLogic Server (10.3.6.0.171017 PSU Patch for BUG26519424)
No auth needed
Prerequisites:
Network access to the target WebLogic server · Vulnerable version of Oracle WebLogic Server
nomisec
WORKING POC
29 stars
by Luffin · remote
https://github.com/Luffin/CVE-2017-10271
This repository contains a functional exploit for CVE-2017-10271, a deserialization vulnerability in Oracle WebLogic's wls-wsat component. The exploit sends crafted SOAP requests to execute arbitrary commands (ping) on both Windows and Linux systems, using DNS log queries via ceye.io to confirm successful execution.
Classification
Working Poc 95%
Target:
Oracle WebLogic Server (wls-wsat component)
No auth needed
Prerequisites:
Target WebLogic server with exposed wls-wsat endpoint · Network access to the target · ceye.io account for DNS log confirmation
nomisec
WORKING POC
22 stars
by s3xy · remote
https://github.com/s3xy/CVE-2017-10271
This repository contains a functional exploit for CVE-2017-10271, which targets Oracle WebLogic Server's WLS-WSAT component. The exploit leverages XML deserialization to achieve remote code execution by crafting a malicious SOAP request with a Java ProcessBuilder payload.
Classification
Working Poc 95%
Target:
Oracle WebLogic Server (versions affected by CVE-2017-10271)
No auth needed
Prerequisites:
Network access to the target WebLogic Server · WLS-WSAT component exposed and accessible
github
WRITEUP
14 stars
by xbl3 · poc
https://github.com/xbl3/awesome-cve-poc_qazbnm456/tree/master/CVE-2017-10271.md
This repository provides a technical overview and references for CVE-2017-10271, a deserialization vulnerability in Oracle WebLogic. It includes links to external PoCs and detailed analysis but does not contain functional exploit code itself.
Classification
Writeup 90%
Attack Type
Deserialization
Target:
Oracle WebLogic Server
No auth needed
Prerequisites:
Network access to vulnerable WebLogic instance
nomisec
SCANNER
9 stars
by ETOCheney · remote
https://github.com/ETOCheney/JavaDeserialization
This repository contains a scanner for CVE-2017-10271, a Java deserialization vulnerability in Oracle WebLogic Server. It uses crafted SOAP requests to trigger a ping command and listens for ICMP responses to detect vulnerable hosts.
Classification
Scanner 90%
Attack Type
Deserialization
Target:
Oracle WebLogic Server
No auth needed
Prerequisites:
Network access to target WebLogic Server · Python environment with required libraries
nomisec
WORKING POC
7 stars
by SuperHacker-liuan · poc
https://github.com/SuperHacker-liuan/cve-2017-10271-poc
This repository contains a functional Rust-based exploit for CVE-2017-10271, targeting Oracle WebLogic Server's WLS-WSAT component. The exploit sends a crafted SOAP request with malicious Java deserialization payloads to achieve remote code execution (RCE).
Classification
Working Poc 95%
Target:
Oracle WebLogic Server (WLS-WSAT component)
No auth needed
Prerequisites:
Network access to vulnerable WebLogic Server · WLS-WSAT endpoint exposed
nomisec
WORKING POC
5 stars
by pssss · remote
https://github.com/pssss/CVE-2017-10271
This repository contains a functional Python exploit for CVE-2017-10271, a deserialization vulnerability in Oracle WebLogic Server. The exploit sends a malicious SOAP request with a crafted XML payload to execute arbitrary commands on the target system.
Classification
Working Poc 95%
Target:
Oracle WebLogic Server
No auth needed
Prerequisites:
Network access to the WebLogic Server's wls-wsat/CoordinatorPortType endpoint
nomisec
WORKING POC
4 stars
by kbsec · remote
https://github.com/kbsec/Weblogic_Wsat_RCE
This repository contains a functional exploit for CVE-2017-10271, targeting Oracle WebLogic Server's WLS-WSAT component. The exploit leverages XML deserialization to achieve remote code execution via `java.lang.Runtime` or `java.lang.ProcessBuilder`.
Classification
Working Poc 95%
Target:
Oracle WebLogic Server (versions affected by CVE-2017-10271)
No auth needed
Prerequisites:
Network access to vulnerable WebLogic server · WLS-WSAT component exposed
nomisec
WORKING POC
3 stars
by pizza-power · remote
https://github.com/pizza-power/weblogic-CVE-2019-2729-POC
This repository contains a functional Python exploit for CVE-2019-2729, a WebLogic deserialization vulnerability. The exploit uses ysoserial to generate a malicious payload and crafts a SOAP request to trigger remote code execution.
Classification
Working Poc 95%
Target:
Oracle WebLogic Server
No auth needed
Prerequisites:
Access to ysoserial.jar · Network access to the target WebLogic server
nomisec
WORKING POC
3 stars
by cjjduck · remote
https://github.com/cjjduck/weblogic_wls_wsat_rce
This repository contains a functional exploit for CVE-2017-10271, a deserialization vulnerability in Oracle WebLogic Server's WLS-WSAT component. The exploit allows unauthenticated remote code execution via crafted SOAP requests with malicious XMLDecoder payloads.
Classification
Working Poc 95%
Target:
Oracle WebLogic Server (10.3.6.0.0, 12.1.3.0.0, 12.2.1.1.0, 12.2.1.2.0)
No auth needed
Prerequisites:
Network access to WebLogic Server · WLS-WSAT component enabled
nomisec
WORKING POC
3 stars
by ZH3FENG · poc
https://github.com/ZH3FENG/PoCs-Weblogic_2017_10271
This repository contains a simplified PoC for CVE-2017-10271, demonstrating an XMLDecoder deserialization vulnerability in WebLogic. The exploit leverages unsafe deserialization of XML input to achieve remote code execution (RCE).
Classification
Working Poc 90%
Target:
Oracle WebLogic Server
No auth needed
Prerequisites:
Network access to vulnerable WebLogic server · Ability to send crafted XML payloads
nomisec
WORKING POC
2 stars
by Al1ex · remote
https://github.com/Al1ex/CVE-2017-10271
This repository contains functional exploit code for CVE-2017-10271, a deserialization vulnerability in Oracle WebLogic Server. The exploit leverages XMLDecoder to execute arbitrary commands via a crafted SOAP request, with support for both Linux and Windows targets.
Classification
Working Poc 95%
Target:
Oracle WebLogic Server (10.3.6.0.0, 12.1.3.0.0, 12.2.1.1.0, 12.2.1.2.0)
No auth needed
Prerequisites:
Network access to the WebLogic Server · Vulnerable WebLogic version
nomisec
SUSPICIOUS
2 stars
by ianxtianxt · poc
https://github.com/ianxtianxt/-CVE-2017-10271-
The repository claims to be a Java deserialization vulnerability exploitation tool for CVE-2017-10271 but provides no actual code, technical details, or proof-of-concept. The README is vague and lacks substance, typical of suspicious repos.
Classification
Suspicious 90%
Attack Type
Deserialization
Target:
Java applications (unspecified)
No auth needed
nomisec
WORKING POC
1 stars
by XHSecurity · remote
https://github.com/XHSecurity/Oracle-WebLogic-CVE-2017-10271
This repository contains a functional exploit for CVE-2017-10271, a bypass for the incomplete patch of CVE-2017-3506 in Oracle WebLogic's WLS-WSAT component. The exploit leverages XMLDecoder deserialization to achieve remote code execution (RCE) by sending crafted SOAP requests.
Classification
Working Poc 95%
Target:
Oracle WebLogic Server (10.3.6.0.0, 12.1.3.0.0, 12.2.1.1.0, 12.2.1.2.0)
No auth needed
Prerequisites:
Network access to the WebLogic server · Vulnerable WLS-WSAT endpoint exposed
nomisec
SUSPICIOUS
1 stars
by Yuusuke4 · poc
https://github.com/Yuusuke4/WebLogic_CNVD_C_2019_48814
The repository contains only a README with a screenshot and no actual exploit code or technical details. It references a CVE but provides no functional PoC or analysis.
Classification
Suspicious 90%
Target:
Oracle WebLogic
No auth needed
nomisec
WORKING POC
1 stars
by lonehand · poc
https://github.com/lonehand/Oracle-WebLogic-CVE-2017-10271-master
This repository provides functional exploit code for CVE-2017-10271, a bypass of the patch for CVE-2017-3506 in Oracle WebLogic's WLS-WSAT component. It includes detailed technical analysis of the vulnerability, patch bypass mechanisms, and multiple PoC payloads for remote code execution via XMLDecoder deserialization.
Classification
Working Poc 95%
Target:
Oracle WebLogic Server (10.3.6.0.0, 12.1.3.0.0, 12.2.1.1.0, 12.2.1.2.0)
No auth needed
Prerequisites:
Network access to WebLogic server · WLS-WSAT component exposed
nomisec
WORKING POC
1 stars
by JackyTsuuuy · remote
https://github.com/JackyTsuuuy/weblogic_wls_rce_poc-exp
The repository contains functional exploit code for CVE-2017-10271, a deserialization vulnerability in Oracle WebLogic Server's WLS-WSAT component. The exploit leverages XMLDecoder to achieve remote code execution by writing a malicious JSP file or executing arbitrary commands.
Classification
Working Poc 95%
Target:
Oracle WebLogic Server (WLS-WSAT component)
No auth needed
Prerequisites:
Network access to the WebLogic Server · WLS-WSAT endpoint exposed
nomisec
WORKING POC
by seoyoung-kang · remote
https://github.com/seoyoung-kang/CVE-2017-10271
This repository contains a functional exploit tool for CVE-2017-10271, targeting Oracle WebLogic Server. The tool includes features for server detection, vulnerability scanning, file upload, command execution, and reverse shell capabilities.
Classification
Working Poc 95%
Target:
Oracle WebLogic Server (10.3.6.0, 12.1.3.0, 12.2.1.1, 12.2.1.2)
No auth needed
Prerequisites:
Network access to the target WebLogic Server · Vulnerable WebLogic Server version
nomisec
STUB
by cved-sources · poc
https://github.com/cved-sources/cve-2017-10271
The repository contains only a Dockerfile and a README, providing a vulnerable environment for CVE-2017-10271 but no actual exploit code or technical details. It references external sources for the vulnerable image but lacks functional PoC or analysis.
Target:
Oracle WebLogic Server 10.3.6
No auth needed
Prerequisites:
Docker environment · Vulnerable WebLogic Server 10.3.6 image
nomisec
WORKING POC
by testwc · remote
https://github.com/testwc/CVE-2017-10271
This repository contains functional exploit code for CVE-2017-10271, a deserialization vulnerability in Oracle WebLogic Server. The exploit allows unauthenticated remote command execution via crafted SOAP requests targeting the WLS Security component.
Classification
Working Poc 95%
Target:
Oracle WebLogic Server (10.3.6.0.0, 12.1.3.0.0, 12.2.1.1.0, 12.2.1.2.0)
No auth needed
Prerequisites:
Network access to the WebLogic Server · Target server must have the vulnerable WLS Security component exposed
nomisec
WORKING POC
by r4b3rt · remote-auth
https://github.com/r4b3rt/CVE-2017-10271
This repository contains functional exploit code for CVE-2017-10271, a deserialization vulnerability in Oracle WebLogic Server's WLS-WSAT component. The exploit includes command execution with output and shell upload capabilities, targeting versions 10.3.6.0.0, 12.1.3.0.0, 12.2.1.1.0, and 12.2.1.2.0.
Classification
Working Poc 95%
Target:
Oracle WebLogic Server (10.3.6.0.0, 12.1.3.0.0, 12.2.1.1.0, 12.2.1.2.0)
No auth needed
Prerequisites:
Network access to the target WebLogic Server · WLS-WSAT component enabled
nomisec
WRITEUP
by peterpeter228 · poc
https://github.com/peterpeter228/Oracle-WebLogic-CVE-2017-10271
The repository provides a detailed technical analysis of CVE-2017-10271, including patch bypass techniques, affected versions, and a partial PoC for CVE-2017-3506. It explains the vulnerability in the WebLogic WLS component and the inadequacy of the initial patch.
Classification
Writeup 90%
Target:
Oracle WebLogic Server (10.3.6.0.0, 12.1.3.0.0, 12.2.1.1.0, 12.2.1.2.0)
No auth needed
Prerequisites:
Network access to the WebLogic server · Vulnerable version of Oracle WebLogic Server
vulncheck_xdb
SCANNER
remote
https://github.com/0xn0ne/weblogicScanner
This repository contains a Python-based scanner for detecting multiple WebLogic vulnerabilities, including CVE-2017-10271. It checks for the presence of vulnerabilities but does not exploit them.
Classification
Scanner 95%
Target:
Oracle WebLogic Server
No auth needed
Prerequisites:
network access to target WebLogic server
metasploit
WORKING POC
EXCELLENT
rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/oracle_weblogic_wsat_deserialization_rce.rb
This Metasploit module exploits a deserialization vulnerability in Oracle WebLogic's WLS WSAT component to achieve remote code execution. It crafts a malicious SOAP request containing a ProcessBuilder payload to execute arbitrary commands on the target system.
Classification
Working Poc 100%
Target:
Oracle WebLogic Server (10.3.6.0.0, 12.1.3.0.0, 12.2.1.1.0, 12.2.1.2.0)
No auth needed
Prerequisites:
Network access to the WebLogic WSAT endpoint · Vulnerable version of Oracle WebLogic Server