nomisec
WORKING POC
4,275 stars
by zhzyker · remote
https://github.com/zhzyker/exphub
The repository contains a working proof-of-concept exploit for CVE-2018-7600, a remote code execution vulnerability in Drupal. The exploit leverages the Drupalgeddon 2 vulnerability to execute arbitrary commands on vulnerable Drupal installations.
Classification
Working Poc 95%
Target:
Drupal 6.x, Drupal 7.x < 7.58, Drupal 8.3 < 8.3.9, Drupal 8.4 < 8.4.6, Drupal 8.5 < 8.5.1
No auth needed
Prerequisites:
Target must be running a vulnerable version of Drupal · Network access to the target
nomisec
WORKING POC
290 stars
by jas502n · remote
https://github.com/jas502n/CVE-2020-14882
This repository provides a working proof-of-concept exploit for CVE-2020-14882, an unauthorized bypass RCE vulnerability in Oracle WebLogic Server. The exploit leverages a bypass of the patch for CVE-2020-14750 by using case manipulation in URL encoding to execute arbitrary commands via a malicious MVEL expression.
Classification
Working Poc 95%
Target:
Oracle WebLogic Server 12.2.1.4.0
No auth needed
Prerequisites:
Access to the WebLogic Server console endpoint · WebLogic Server version vulnerable to CVE-2020-14882
nomisec
WORKING POC
147 stars
by GGyao · remote
https://github.com/GGyao/CVE-2020-14882_ALL
This is a functional exploit for CVE-2020-14882, targeting Oracle WebLogic Server. It leverages a deserialization vulnerability in the console component to achieve remote command execution (RCE) via crafted HTTP requests.
Classification
Working Poc 95%
Target:
Oracle WebLogic Server (10.x, 12.x)
No auth needed
Prerequisites:
Network access to the WebLogic console · Vulnerable WebLogic version
nomisec
WORKING POC
29 stars
by s1kr10s · remote
https://github.com/s1kr10s/CVE-2020-14882
This PoC exploits CVE-2020-14882, a remote code execution vulnerability in Oracle WebLogic Server. It sends a crafted POST request with an MVEL expression payload to execute arbitrary commands on the target system.
Classification
Working Poc 95%
Target:
Oracle WebLogic Server (versions affected by CVE-2020-14882)
No auth needed
Prerequisites:
Network access to the WebLogic Server console · WebLogic Server vulnerable to CVE-2020-14882
nomisec
WORKING POC
21 stars
by NS-Sp4ce · remote
https://github.com/NS-Sp4ce/CVE-2020-14882
This is a functional exploit for CVE-2020-14882, targeting Oracle WebLogic Server via a path traversal and deserialization vulnerability to achieve remote code execution (RCE). The script supports both command execution (WebLogic 12) and XML payload deployment (WebLogic 10).
Classification
Working Poc 95%
Target:
Oracle WebLogic Server (versions affected by CVE-2020-14882)
No auth needed
Prerequisites:
Network access to the WebLogic Server console · Target must be vulnerable to CVE-2020-14882
nomisec
WORKING POC
17 stars
by XTeam-Wing · remote
https://github.com/XTeam-Wing/CVE-2020-14882
This PoC exploits CVE-2020-14882, a path traversal vulnerability in Oracle WebLogic Server, to achieve remote code execution (RCE) via a crafted URL and payload. The exploit leverages the MVEL expression language to execute arbitrary commands on the target system.
Classification
Working Poc 95%
Target:
Oracle WebLogic Server
No auth needed
Prerequisites:
Target WebLogic Server with vulnerable endpoint exposed · Network access to the target server
nomisec
SCANNER
13 stars
by adm1in · poc
https://github.com/adm1in/CodeTest
This repository contains a multi-vulnerability scanner for various software, including exploits for CVE-2020-14882 (Oracle WebLogic). It uses DNS log checks and HTTP requests to test for vulnerabilities.
Classification
Scanner 90%
Target:
Multiple (Apache ActiveMQ, Shiro, Solr, Struts2, Tomcat, Unomi, Drupal, Elasticsearch, Fastjson, Jenkins, Nexus, Oracle WebLogic, Red Hat JBoss, ThinkPHP)
No auth needed
Prerequisites:
Network access to target · DNS log service (dnslog.cn)
nomisec
SCANNER
12 stars
by GGyao · remote
https://github.com/GGyao/CVE-2020-14882_POC
This repository contains a Python script that checks for the presence of CVE-2020-14882, a path traversal vulnerability in Oracle WebLogic Server. The script sends a crafted HTTP request to a list of targets and checks for a specific string in the response to determine vulnerability.
Classification
Scanner 90%
Target:
Oracle WebLogic Server
No auth needed
Prerequisites:
List of target URLs in a file named 'target.txt'
nomisec
WORKING POC
8 stars
by wsfengfan · remote
https://github.com/wsfengfan/cve-2020-14882
This is a functional exploit for CVE-2020-14882, targeting Oracle WebLogic Server. It leverages an MVEL expression injection vulnerability to achieve remote code execution (RCE) by manipulating the console.portal endpoint.
Classification
Working Poc 95%
Target:
Oracle WebLogic Server (10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0)
No auth needed
Prerequisites:
Network access to the WebLogic Server console · Vulnerable version of Oracle WebLogic Server
nomisec
WORKING POC
8 stars
by ludy-dev · remote
https://github.com/ludy-dev/Weblogic_Unauthorized-bypass-RCE
This PoC exploits CVE-2020-14882, an unauthorized bypass RCE vulnerability in Oracle WebLogic Server. It sends a crafted POST request to execute arbitrary commands via MVEL expression injection, specifically running 'ipconfig' to verify exploitation.
Classification
Working Poc 95%
Target:
Oracle WebLogic Server (10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0)
No auth needed
Prerequisites:
Network access to the WebLogic console portal · WebLogic Server with vulnerable versions
nomisec
WORKING POC
8 stars
by QmF0c3UK · remote
https://github.com/QmF0c3UK/CVE-2020-14882
This is a functional exploit for CVE-2020-14882, targeting Oracle WebLogic Server via an unauthenticated RCE vulnerability in the console component. It uses a crafted payload to execute arbitrary commands via MVEL expression injection.
Classification
Working Poc 95%
Target:
Oracle WebLogic Server (versions affected by CVE-2020-14882)
No auth needed
Prerequisites:
Network access to the WebLogic console · Vulnerable WebLogic Server version
nomisec
WORKING POC
8 stars
by milo2012 · remote
https://github.com/milo2012/CVE-2020-14882
This PoC exploits CVE-2020-14882, an unauthenticated RCE vulnerability in Oracle WebLogic Server. It uses two different exploitation methods depending on the target version: ShellSession for versions >= 12.2.1 and FileSystemXmlApplicationContext for older versions.
Classification
Working Poc 95%
Target:
Oracle WebLogic Server (versions 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0)
No auth needed
Prerequisites:
Network access to the WebLogic Server console · Python environment with required libraries (requests, bs4, packaging, user_agent)
nomisec
WRITEUP
7 stars
by corelight · poc
https://github.com/corelight/CVE-2020-14882-weblogicRCE
This repository provides detection rules and guidance for identifying exploitation attempts of CVE-2020-14882 and CVE-2020-14750, which are unauthenticated RCE vulnerabilities in Oracle WebLogic Server. It includes Zeek scripts for monitoring and alerting on exploit attempts via GET/POST methods.
Classification
Writeup 100%
Target:
Oracle WebLogic Server
No auth needed
Prerequisites:
Network access to vulnerable WebLogic Server · Zeek installed for detection
github
SUSPICIOUS
6 stars
by Y5neKO · pythonpoc
https://github.com/Y5neKO/ExpAndPoc_Collection/tree/main/CVE-2020-14882
The repository contains only a README with a link to an external GitHub repository and minimal details about the vulnerability. No actual exploit code or technical analysis is provided.
Classification
Suspicious 90%
Target:
unknown
No auth needed
nomisec
WRITEUP
5 stars
by xfiftyone · poc
https://github.com/xfiftyone/CVE-2020-14882
This repository contains a README with images demonstrating the exploitation of CVE-2020-14882, a vulnerability in Oracle WebLogic Server. No actual exploit code is provided, only visual evidence of successful exploitation.
Classification
Writeup 90%
Target:
Oracle WebLogic Server 10 and 12
No auth needed
Prerequisites:
Access to a vulnerable Oracle WebLogic Server instance
nomisec
WORKING POC
3 stars
by mmioimm · remote
https://github.com/mmioimm/cve-2020-14882
This PoC exploits CVE-2020-14882, a deserialization vulnerability in Oracle WebLogic Server, to achieve remote code execution (RCE). It includes payloads for both WebLogic 12.2 and 12.1, leveraging MVEL expressions and serialized Java objects to execute arbitrary commands.
Classification
Working Poc 95%
Target:
Oracle WebLogic Server 12.1 and 12.2
No auth needed
Prerequisites:
Network access to the WebLogic Server console · Vulnerable WebLogic Server version
nomisec
WORKING POC
3 stars
by murataydemir · remote
https://github.com/murataydemir/CVE-2020-14882
This repository provides a proof-of-concept for CVE-2020-14882, an authentication bypass vulnerability in Oracle WebLogic Server. The exploit leverages a path traversal technique via a crafted HTTP GET request to bypass authentication and access the admin console.
Classification
Working Poc 90%
Target:
Oracle WebLogic Server (10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0)
No auth needed
Prerequisites:
Network access to the target WebLogic Server
nomisec
WORKING POC
3 stars
by kk98kk0 · remote
https://github.com/kk98kk0/CVE-2020-14882
This repository provides a proof-of-concept exploit for CVE-2020-14882, demonstrating how to deploy an in-memory web shell (冰蝎) on vulnerable Oracle WebLogic Server instances. It leverages the com.tangosol.coherence.mvel2.sh.ShellSession gadget to execute arbitrary code and load a malicious JAR file via URLClassLoader.
Classification
Working Poc 90%
Target:
Oracle WebLogic Server 12.2.1 and above
No auth needed
Prerequisites:
Vulnerable WebLogic Server instance · Network access to the target · Remote JAR file hosting
nomisec
WORKING POC
3 stars
by exploitblizzard · remote
https://github.com/exploitblizzard/CVE-2020-14882-WebLogic
This PoC exploits CVE-2020-14882, a remote code execution vulnerability in Oracle WebLogic Server. It leverages a path traversal and deserialization flaw to execute arbitrary commands via a crafted POST request.
Classification
Working Poc 95%
Target:
Oracle WebLogic Server (versions affected by CVE-2020-14882)
No auth needed
Prerequisites:
Network access to the WebLogic Server console · WebLogic Server vulnerable to CVE-2020-14882
nomisec
WORKING POC
2 stars
by 0thm4n3 · remote
https://github.com/0thm4n3/cve-2020-14882
This repository contains a Bash script that exploits CVE-2020-14882, an unauthenticated remote command execution vulnerability in Oracle WebLogic. The script sends a crafted POST request to trigger the execution of 'calc.exe' via MVEL expression injection.
Classification
Working Poc 90%
Target:
Oracle WebLogic Server
No auth needed
Prerequisites:
Target must be running a vulnerable version of Oracle WebLogic Server · Network access to the target's WebLogic console
nomisec
WORKING POC
2 stars
by Ormicron · remote
https://github.com/Ormicron/CVE-2020-14882-GUI-Test
This is a GUI-based PoC for CVE-2020-14882, an RCE vulnerability in Oracle WebLogic Server. It crafts a malicious request to exploit the deserialization flaw via the console path, allowing arbitrary command execution.
Classification
Working Poc 90%
Target:
Oracle WebLogic Server (versions affected by CVE-2020-14882)
No auth needed
Prerequisites:
Network access to vulnerable WebLogic Server · Exposed console interface
nomisec
WORKING POC
2 stars
by Danny-LLi · remote
https://github.com/Danny-LLi/CVE-2020-14882
This is a Python-based exploit for CVE-2020-14882, an unauthenticated RCE vulnerability in Oracle WebLogic Server. It crafts a malicious GET request to execute arbitrary commands via MVEL expression injection.
Classification
Working Poc 95%
Target:
Oracle WebLogic Server (versions affected by CVE-2020-14882)
No auth needed
Prerequisites:
Python 3 · requests library · urllib3 library · target WebLogic Server exposed on the network
nomisec
WORKING POC
2 stars
by N0Coriander · remote
https://github.com/N0Coriander/CVE-2020-14882-14883
This PoC exploits CVE-2020-14882 (unauthorized access) and CVE-2020-14883 (RCE) in Oracle WebLogic Server by leveraging path traversal and JNDI injection to achieve remote command execution. It includes interactive command execution for verified vulnerable targets.
Classification
Working Poc 95%
Target:
Oracle WebLogic Server (versions affected by CVE-2020-14882/14883)
No auth needed
Prerequisites:
Network access to WebLogic Server Console · Vulnerable WebLogic version
nomisec
WORKING POC
1 stars
by b1g-b33f · remote
https://github.com/b1g-b33f/CVE-2020-14882
This Bash script tests for CVE-2020-14882, an authentication bypass in Oracle WebLogic, by sending a crafted POST request to a path traversal endpoint. It also demonstrates the associated RCE (CVE-2020-14883) by executing a curl command via MVEL expression injection.
Classification
Working Poc 90%
Target:
Oracle WebLogic Server
No auth needed
Prerequisites:
Network access to the WebLogic server · WebLogic Console exposed
nomisec
WORKING POC
1 stars
by ovProphet · infoleak
https://github.com/ovProphet/CVE-2020-14882-checker
This PoC checks for CVE-2020-14882, an RCE vulnerability in Oracle WebLogic Server. It exploits a path traversal and deserialization flaw to execute arbitrary code via a crafted HTTP request, confirming vulnerability by injecting a test string.
Classification
Working Poc 95%
Target:
Oracle WebLogic Server (versions affected by CVE-2020-14882)
No auth needed
Prerequisites:
Network access to the target WebLogic Server · WebLogic Server with vulnerable endpoint exposed
nomisec
WORKING POC
by alexfrancow · remote
https://github.com/alexfrancow/CVE-2020-14882
This PoC exploits CVE-2020-14882, an RCE vulnerability in Oracle WebLogic Server, by leveraging path traversal and deserialization to execute arbitrary commands. It includes examples for launching calc.exe and a reverse shell via a malicious XML file.
Classification
Working Poc 95%
Target:
Oracle WebLogic Server
No auth needed
Prerequisites:
Network access to the target WebLogic Server · WebLogic Server with vulnerable console exposed
nomisec
SCANNER
by pwn3z · remote
https://github.com/pwn3z/CVE-2020-14882-WebLogic
This script scans for Oracle WebLogic servers vulnerable to CVE-2020-14882 by checking the version via HTTP responses. It identifies vulnerable versions but does not exploit the vulnerability.
Classification
Scanner 90%
Target:
Oracle WebLogic Server versions 10.3.6.0.0, 12.1.3.0.0, 12.2.1.0.0, 12.2.1.4.0, 14.1.1.0.0, 12.2.1.3.0, 12.2.1.1.0, 12.2.1.2.0
No auth needed
Prerequisites:
List of target hosts in a file named 'hosts'
nomisec
WORKING POC
by nik0nz7 · remote
https://github.com/nik0nz7/CVE-2020-14882
This PoC exploits CVE-2020-14882, a remote code execution vulnerability in Oracle WebLogic Server. It leverages an unsafe deserialization flaw in the console to execute arbitrary commands via MVEL expressions.
Classification
Working Poc 95%
Target:
Oracle WebLogic Server (versions affected by CVE-2020-14882)
No auth needed
Prerequisites:
Network access to the WebLogic Server console · Console path accessible
nomisec
WORKING POC
by Root-Shells · remote
https://github.com/Root-Shells/CVE-2020-14882
This PowerShell script exploits CVE-2020-14882 to achieve unauthenticated remote code execution on Oracle WebLogic Server by sending a crafted GET request. The exploit leverages a path traversal and deserialization vulnerability to execute arbitrary commands.
Classification
Working Poc 95%
Target:
Oracle WebLogic Server (10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0)
No auth needed
Prerequisites:
Network access to the target WebLogic Server · Target server must be running a vulnerable version
nomisec
WORKING POC
by LucasPDiniz · remote
https://github.com/LucasPDiniz/CVE-2020-14882
This repository provides a working proof-of-concept for CVE-2020-14882, a critical RCE vulnerability in Oracle WebLogic Server. The exploit leverages a path traversal and XML external entity injection to achieve remote code execution on vulnerable WebLogic instances.
Classification
Working Poc 95%
Target:
Oracle WebLogic Server (10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0, 14.1.1.0.0)
No auth needed
Prerequisites:
Access to a vulnerable WebLogic Server instance · Ability to host a malicious XML file on an attacker-controlled server
nomisec
WORKING POC
by xMr110 · remote
https://github.com/xMr110/CVE-2020-14882
This is a functional exploit for CVE-2020-14882, targeting Oracle WebLogic Server 12.2.1.0. It leverages an unauthenticated RCE vulnerability via MVEL expression injection in the console portal, allowing arbitrary command execution.
Classification
Working Poc 95%
Target:
Oracle WebLogic Server 12.2.1.0
No auth needed
Prerequisites:
Target must be running Oracle WebLogic Server 12.2.1.0 · Network access to the WebLogic console
nomisec
WORKING POC
by zesnd · remote
https://github.com/zesnd/CVE-2020-14882-POC
This is a functional exploit for CVE-2020-14882, targeting Oracle WebLogic Server. It leverages an unsafe deserialization vulnerability in the console to achieve remote code execution (RCE) via MVEL expression injection.
Classification
Working Poc 95%
Target:
Oracle WebLogic Server (versions affected by CVE-2020-14882)
No auth needed
Prerequisites:
Network access to the WebLogic console · Vulnerable WebLogic version
nomisec
WORKING POC
by AleksaZatezalo · remote
https://github.com/AleksaZatezalo/CVE-2020-14882
This Python script exploits CVE-2020-14882, a remote code execution vulnerability in Oracle WebLogic Server, by sending crafted HTTP requests to execute arbitrary commands via PowerShell and retrieve output through a temporary HTTP listener.
Classification
Working Poc 95%
Target:
Oracle WebLogic Server (versions affected by CVE-2020-14882)
No auth needed
Prerequisites:
Network access to vulnerable WebLogic Server · Python environment with required libraries (requests, socket, etc.)
nomisec
WORKING POC
by qianniaoge · poc
https://github.com/qianniaoge/CVE-2020-14882_Exploit_Gui
This repository contains a GUI-based exploit for CVE-2020-14882, targeting Oracle WebLogic Server. It supports reverse shell functionality and includes proxy features for enhanced usability.
Classification
Working Poc 90%
Target:
Oracle WebLogic Server (versions including 10.3.6)
No auth needed
Prerequisites:
Access to a vulnerable Oracle WebLogic Server instance · Network connectivity to the target · A listener setup for reverse shell
vulncheck_xdb
SCANNER
remote
https://github.com/0xn0ne/weblogicScanner
This repository contains a Python-based scanner for detecting multiple WebLogic vulnerabilities, including CVE-2020-14882. It checks for the presence of vulnerabilities but does not exploit them.
Classification
Scanner 95%
Target:
Oracle WebLogic Server
No auth needed
Prerequisites:
network access to target WebLogic server
vulncheck_xdb
WRITEUP
remote
https://github.com/ihebski/A-Red-Teamer-diaries
This repository provides a detailed technical writeup on Active Directory Certificate Services (ADCS) exploitation techniques, specifically focusing on misconfigured certificate templates (ESC1, ESC2, ESC3, ESC4). It includes command examples, tool references, and step-by-step exploitation methods for privilege escalation in AD environments.
Classification
Writeup 90%
Target:
Active Directory Certificate Services (ADCS)
Auth required
Prerequisites:
Access to AD environment · Valid domain credentials · Misconfigured certificate templates
exploitdb
WORKING POC
by CHackA0101 · pythonwebappsjava
https://www.exploit-db.com/exploits/49479
This exploit leverages an unauthenticated RCE vulnerability in Oracle WebLogic Server 12.2.1.0 via path traversal and MVEL expression injection. It allows arbitrary command execution by sending a crafted request to the vulnerable endpoint.
Classification
Working Poc 95%
Target:
Oracle WebLogic Server 12.2.1.0
No auth needed
Prerequisites:
Network access to the target WebLogic Server · Vulnerable version of Oracle WebLogic Server (12.2.1.0)