exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotewindows
https://www.exploit-db.com/exploits/45193
This Metasploit module exploits CVE-2018-2628, an unauthenticated deserialization vulnerability in Oracle WebLogic Server's T3 interface, allowing remote code execution via a crafted serialized object.
Classification
Working Poc 95%
Target:
Oracle WebLogic Server (T3 interface)
No auth needed
Prerequisites:
Network access to the T3 interface (default port 7001) · Vulnerable WebLogic Server version
exploitdb
WORKING POC
VERIFIED
by brianwrf · pythonremotemultiple
https://www.exploit-db.com/exploits/44553
This exploit leverages a deserialization vulnerability in Oracle WebLogic Server to achieve remote command execution. It uses ysoserial to generate a malicious payload and sends it via the T3 protocol to trigger the vulnerability.
Classification
Working Poc 95%
Target:
Oracle WebLogic Server (10.3.6.0, 12.1.3.0, 12.2.1.2, 12.2.1.3)
No auth needed
Prerequisites:
Access to ysoserial tool · Network access to the target WebLogic Server · JRMPListener setup for payload delivery
exploitdb
WORKING POC
by allyshka · javaremotemultiple
https://www.exploit-db.com/exploits/46513
This is a functional exploit for CVE-2018-3245, a deserialization vulnerability in Oracle WebLogic. It leverages JRMP (Java Remote Method Protocol) to achieve remote code execution by bypassing previous patches.
Classification
Working Poc 95%
Target:
Oracle WebLogic Server
No auth needed
Prerequisites:
Network access to the target WebLogic server · JRMP listener set up on attacker-controlled host
nomisec
SCANNER
2,072 stars
by 0xn0ne · remote
https://github.com/0xn0ne/weblogicScanner
This repository contains a WebLogic vulnerability scanner that checks for multiple CVEs, including CVE-2018-2628. It is a Python-based tool designed to detect vulnerabilities in Oracle WebLogic Server by sending crafted requests and analyzing responses.
Classification
Scanner 95%
Target:
Oracle WebLogic Server
No auth needed
Prerequisites:
Network access to the target WebLogic Server · Python 3.6 or higher
nomisec
WORKING POC
114 stars
by tdy218 · remote
https://github.com/tdy218/ysoserial-cve-2018-2628
This repository contains a proof-of-concept exploit for CVE-2018-2628, a deserialization vulnerability in WebLogic Server 10.3.6. It includes tools to generate malicious payloads and a JRMP listener to execute arbitrary commands on vulnerable systems.
Classification
Working Poc 95%
Attack Type
Deserialization
Target:
Oracle WebLogic Server 10.3.6 (with Patch Set Update 180417)
No auth needed
Prerequisites:
Python 2.7.x · Oracle Java SE 1.7+ · Vulnerable WebLogic Server instance
nomisec
WORKING POC
107 stars
by jas502n · remote
https://github.com/jas502n/CVE-2018-2628
This repository contains a Python-based exploit for CVE-2018-2628, a deserialization vulnerability in Oracle WebLogic Server. The exploit includes a reverse shell payload and demonstrates remote code execution (RCE) by leveraging the T3 protocol.
Classification
Working Poc 95%
Target:
Oracle WebLogic Server
No auth needed
Prerequisites:
Network access to the target WebLogic Server · T3 protocol enabled on the target
nomisec
WORKING POC
78 stars
by shengqi158 · remote
https://github.com/shengqi158/CVE-2018-2628
This PoC exploits CVE-2018-2628, a deserialization vulnerability in Oracle WebLogic Server, by sending a crafted T3 protocol payload to achieve remote code execution. The script includes a handshake, payload construction, and vulnerability verification.
Classification
Working Poc 95%
Attack Type
Deserialization
Target:
Oracle WebLogic Server
No auth needed
Prerequisites:
Network access to the target WebLogic Server · T3 protocol enabled on the target
nomisec
WORKING POC
20 stars
by forlin · remote
https://github.com/forlin/CVE-2018-2628
This PoC exploits CVE-2018-2628, a deserialization vulnerability in Oracle WebLogic Server, by sending a crafted T3 protocol request to achieve remote code execution. The script includes a T3 handshake, payload construction, and vulnerability verification.
Classification
Working Poc 95%
Attack Type
Deserialization
Target:
Oracle WebLogic Server (versions affected by CVE-2018-2628)
No auth needed
Prerequisites:
Network access to the target WebLogic Server · T3 protocol enabled on the target
nomisec
WORKING POC
15 stars
by aedoo · remote
https://github.com/aedoo/CVE-2018-2628-MultiThreading
This is a Python-based exploit for CVE-2018-2628, a deserialization vulnerability in Oracle WebLogic Server. It sends a crafted T3 request to trigger the vulnerability and checks for successful exploitation.
Classification
Working Poc 95%
Attack Type
Deserialization
Target:
Oracle WebLogic Server
No auth needed
Prerequisites:
Network access to the target WebLogic Server · T3 protocol enabled on the target
nomisec
WORKING POC
14 stars
by jiansiting · remote
https://github.com/jiansiting/weblogic-cve-2018-2628
This is a Python-based exploit for CVE-2018-2628, a deserialization vulnerability in Oracle WebLogic Server. It crafts a malicious T3 protocol request to achieve remote code execution (RCE) by sending a serialized payload.
Classification
Working Poc 95%
Target:
Oracle WebLogic Server (versions affected by CVE-2018-2628)
No auth needed
Prerequisites:
Network access to the target WebLogic Server T3 port (default 7001) · Vulnerable version of WebLogic Server
nomisec
WORKING POC
12 stars
by 0xMJ · remote
https://github.com/0xMJ/CVE-2018-2628
This is a functional exploit for CVE-2018-2628, a deserialization vulnerability in Oracle WebLogic Server. It leverages ysoserial to generate a malicious payload and uses a JRMP listener to achieve remote command execution.
Classification
Working Poc 95%
Target:
Oracle WebLogic Server (10.3.6.0, 12.1.3.0, 12.2.1.2, 12.2.1.3)
No auth needed
Prerequisites:
Access to ysoserial.jar · Network access to the target WebLogic Server · JRMP listener setup
nomisec
WORKING POC
9 stars
by Lighird · poc
https://github.com/Lighird/CVE-2018-2628
This repository contains a PoC for CVE-2018-2628, a deserialization vulnerability in Oracle WebLogic Server. It includes detection tools, an exploit script, and a modified ysoserial jar for payload generation.
Classification
Working Poc 90%
Attack Type
Deserialization
Target:
Oracle WebLogic Server
No auth needed
Prerequisites:
Network access to vulnerable WebLogic Server · ysoserial jar for payload generation
nomisec
WORKING POC
5 stars
by Nervous · remote
https://github.com/Nervous/WebLogic-RCE-exploit
This exploit targets a deserialization vulnerability in Oracle WebLogic Server (CVE-2018-2628) to achieve remote code execution. It sends a crafted T3/IIOP request with a malicious serialized payload to execute arbitrary commands or deploy a JSPX webshell.
Classification
Working Poc 95%
Target:
Oracle WebLogic Server (versions 10.3.6.0, 12.1.3.0, 12.2.1.2, 12.2.1.3)
No auth needed
Prerequisites:
Network access to the WebLogic T3/IIOP port (typically 7001 or 7002) · Vulnerable WebLogic Server version
nomisec
WORKING POC
3 stars
by likekabin · poc
https://github.com/likekabin/CVE-2018-2628
This repository contains a Python script that exploits CVE-2018-2628, a vulnerability in Oracle WebLogic Server. The exploit allows remote command execution by sending base64-encoded commands to a vulnerable endpoint.
Classification
Working Poc 95%
Target:
Oracle WebLogic Server
No auth needed
Prerequisites:
Vulnerable Oracle WebLogic Server instance · Network access to the target
nomisec
SCANNER
2 stars
by zjxzjx · remote
https://github.com/zjxzjx/CVE-2018-2628-detect
This repository contains a Python-based scanner for detecting CVE-2018-2628, a deserialization vulnerability in Oracle WebLogic Server. The script performs batch checks against multiple targets listed in a file and determines vulnerability status based on response length.
Classification
Scanner 90%
Attack Type
Deserialization
Target:
Oracle WebLogic Server
No auth needed
Prerequisites:
List of target IPs and ports in a file named 'url.txt'
nomisec
WORKING POC
2 stars
by Shadowshusky · remote-auth
https://github.com/Shadowshusky/CVE-2018-2628all
This repository contains a Python-based proof-of-concept exploit for CVE-2018-2628, a deserialization vulnerability in Oracle WebLogic Server. The script includes functionality for batch testing multiple targets and leverages a crafted T3 protocol payload to trigger the vulnerability.
Classification
Working Poc 95%
Attack Type
Deserialization
Target:
Oracle WebLogic Server
No auth needed
Prerequisites:
Network access to the target WebLogic Server · T3 protocol enabled on the target
nomisec
WORKING POC
1 stars
by herantong · remote
https://github.com/herantong/CVE-2018-2628
This repository contains a Python-based exploit for CVE-2018-2628, a deserialization vulnerability in Oracle WebLogic Server. It includes a PoC script to test for the vulnerability and a separate script to achieve remote code execution by deploying a malicious payload.
Classification
Working Poc 95%
Attack Type
Deserialization
Target:
Oracle WebLogic Server
No auth needed
Prerequisites:
Network access to the target WebLogic Server · Python 3 environment with 'requests' module
nomisec
WORKING POC
1 stars
by 9uest · remote
https://github.com/9uest/CVE-2018-2628
This is a Python-based exploit for CVE-2018-2628, a deserialization vulnerability in Oracle WebLogic Server. It performs a T3 handshake, sends a malicious payload, and checks for vulnerability presence.
Classification
Working Poc 95%
Attack Type
Deserialization
Target:
Oracle WebLogic Server
No auth needed
Prerequisites:
Network access to the target WebLogic Server · T3 protocol enabled on the target
nomisec
WORKING POC
1 stars
by victor0013 · remote
https://github.com/victor0013/CVE-2018-2628
This repository provides a proof-of-concept for exploiting CVE-2018-2628, a deserialization vulnerability in Oracle WebLogic Server. It uses ysoserial to generate payloads and includes steps for setting up a JRMP listener and achieving remote code execution.
Classification
Working Poc 90%
Attack Type
Deserialization
Target:
Oracle WebLogic Server
No auth needed
Prerequisites:
Access to ysoserial.jar · Network access to the target WebLogic Server
nomisec
WORKING POC
1 stars
by skydarker · remote-auth
https://github.com/skydarker/CVE-2018-2628
This is a functional exploit PoC for CVE-2018-2628, a deserialization vulnerability in Oracle WebLogic Server. It includes a T3 protocol handshake and payload delivery mechanism to trigger the vulnerability.
Classification
Working Poc 95%
Attack Type
Deserialization
Target:
Oracle WebLogic Server
No auth needed
Prerequisites:
Network access to the target WebLogic Server · T3 protocol access (typically port 7001)
nomisec
WORKING POC
by cscadoge · remote
https://github.com/cscadoge/weblogic-cve-2018-2628
This repository contains a Python-based exploit for CVE-2018-2628, a deserialization vulnerability in Oracle WebLogic Server. The exploit leverages ysoserial to generate a malicious payload and uses a JRMP listener to achieve remote code execution.
Classification
Working Poc 95%
Target:
Oracle WebLogic Server (10.3.6.0, 12.1.3.0, 12.2.1.2, 12.2.1.3)
No auth needed
Prerequisites:
Access to ysoserial.jar · Network access to the target WebLogic Server · JRMP listener setup
nomisec
WORKING POC
by BabyTeam1024 · poc
https://github.com/BabyTeam1024/cve-2018-2628
This repository contains a functional exploit for CVE-2018-2628, a deserialization vulnerability in Oracle WebLogic Server. The exploit includes payload generation, RMI installation for persistent access, and command execution capabilities.
Classification
Working Poc 95%
Attack Type
Deserialization
Target:
Oracle WebLogic Server
No auth needed
Prerequisites:
Network access to WebLogic T3/T3S port · Vulnerable WebLogic Server version
nomisec
STUB
by seethen · poc
https://github.com/seethen/cve-2018-2628
The repository contains only a README.md file with minimal content, providing no exploit code or technical details for CVE-2018-2628.
Target:
unknown
No auth needed
nomisec
WRITEUP
by wrysunny · poc
https://github.com/wrysunny/cve-2018-2628
The repository contains a README.md file referencing CVE-2018-2628, which is a vulnerability in Oracle WebLogic Server. The file mentions a reverse shell but lacks actual exploit code or technical details.
Classification
Writeup 30%
Target:
Oracle WebLogic Server
No auth needed
Prerequisites:
Access to a vulnerable Oracle WebLogic Server instance
metasploit
WORKING POC
MANUAL
by brianwrf, Jacob Robles · rubypocunix
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/misc/weblogic_deserialize.rb
This Metasploit module exploits a deserialization vulnerability in Oracle WebLogic Server (CVE-2018-2628) to achieve remote code execution. It crafts a malicious serialized object and sends it to the T3 interface, allowing unauthenticated attackers to execute arbitrary commands.
Classification
Working Poc 95%
Target:
Oracle WebLogic Server (versions 10.3.6.0, 12.1.3.0, 12.2.1.3 and below)
No auth needed
Prerequisites:
Network access to the WebLogic T3 interface (default port 7001) · Vulnerable WebLogic version