670
VMScore

CVE-2019-2729

Published: 19/06/2019 Updated: 10/11/2022
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 670
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: Web Services). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0 and 12.2.1.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

oracle identity manager 11.1.2.3.0

oracle weblogic server 12.1.3.0.0

oracle peoplesoft enterprise peopletools 8.56

oracle weblogic server 10.3.6.0.0

oracle weblogic server 12.2.1.3.0

oracle peoplesoft enterprise peopletools 8.57

oracle identity manager 12.2.1.3.0

oracle peoplesoft enterprise peopletools 8.58

oracle rapid planning 12.1

oracle communications diameter signaling router 8.2

oracle communications diameter signaling router 8.2.1

oracle rapid planning 12.2

oracle communications network integrity

oracle hyperion infrastructure technology 11.1.2.4

oracle hyperion infrastructure technology 11.2.5.0

oracle communications diameter signaling router 8.1

oracle communications diameter signaling router 8.0

oracle storagetek tape analytics sw tool 2.3

oracle tape library acsls 8.5

Exploits

Oracle Weblogic version 103600 remote command execution exploit ...

Github Repositories

Exploit code for CVE-2019-2729

CVE-2019-2729 Exploit code for CVE-2019-2729 Oracle Weblogic running on Windows Can create a callback to a CobaltStrike listener or a Metasploit handler with payload windows/meterpreter/reverse_tcp Also have a non-beacon exploit that just executes commands on the underlying host (exploitpy) This version also has proxy support enabled

CVE-2019-2729 Exploit Script

CVE-2019-2729-Exploit usage: oracle-weblogic-deserializepy [-h] -u TARGET -c COMMAND -h, --help : Show help message and exit -u TARGET : Target URL -c COMMAND : Command to execute Example Usage python oracle-weblogic-deserializepy -u 19216811:8080 -c whoami Credit for YSS Payload githubcom/waffl3ss/CVE-2019-2729

Weblogic CVE-2019-2725 CVE-2019-2729 Getshell 命令执行

weblogic CVE-2019-2725 CVE-2019-2729 POC 执行命令并回显 usage: 单个目标 python3 weblogic_get_webshellpy url 批量目标,将批量url放入url_listtxt python3 weblogic_get_webshellpy all

python3 POC for CVE-2019-2729 WebLogic Deserialization Vulnerability and CVE-2017-10271 amongst others

weblogic-CVE-2019-2729-POC python3 POC for CVE-2019-2729 WebLogic Deserialization Vulnerability and CVE-2017-10271 amongst others

WebLogic Insecure Deserialization - CVE-2019-2725 payload builder & exploit

CVE-2019-2725 WebLogic Universal Exploit - CVE-2017-3506 / CVE-2017-10271 / CVE-2019-2725 / CVE-2019-2729 payload builder & exploit Info / Help $ python3 weblogic_exploitpy -h ======================================================================== | WebLogic Universal Exploit | | CVE-2017-3506 / CVE-2017-10271 / CVE-2019-2

FrameScan 一款python3编写的简易的cms漏洞检测框架

FrameScan 工具简介 FrameScan是一款python3编写的简易的cms漏洞检测利用框架,支持漏洞检测与简单利用方式,支持大多数CMS,可以自定义CMS类型及自行编写POC。旨在帮助有安全经验的安全工程师对已知的应用快速发现漏洞。 支持平台 Windows Linux MAC(请自测) 工具特点 单URL批量检测 单URL单

PoC for exploiting CVE-2019-2729 on WebLogic

CVE-2019-2729 - creal PoC for exploiting CVE-2019-2729 on WebLogic Exploit Usage python3 crealpy -h usage: crealpy [-h] [-u URL] [-f F] [-c CMD] [-s SH] optional arguments: -h, --help show this help message and exit -u URL, --url URL target url -f F, --file F url file -c CMD, --command CMD command -s SH, --shell SH

CVE-2019-2725 WebLogic Universal Exploit - CVE-2017-3506 / CVE-2017-10271 / CVE-2019-2725 / CVE-2019-2729 payload builder & exploit Info / Help $ python3 weblogic_exploitpy -h ======================================================================== | WebLogic Universal Exploit | | CVE-2017-3506 / CVE-2017-10271 / CVE-2019-2

Exploit code for CVE-2019-2729

CVE-2019-2729 Exploit code for CVE-2019-2729 Oracle Weblogic running on Windows Can create a callback to a CobaltStrike listener or a Metasploit handler with payload windows/meterpreter/reverse_tcp Also have a non-beacon exploit that just executes commands on the underlying host (exploitpy) This version also has proxy support enabled

Recent Articles

IT threat evolution Q3 2019
Securelist • David Emm • 29 Nov 2019

At the end of June we reported the details of a highly targeted campaign that we dubbed ‘Operation ViceLeaker’ involving the spread of malicious Android samples via instant messaging. The campaign affected several dozen victims in Israel and Iran. We discovered this activity in May 2018, right after Israeli security agencies announced that Hamas had installed spyware on the smartphones of Israeli soldiers, and we released a private report on our Threat Intelligence Portal. We believe the mal...

Using Oracle WebLogic? Put down your coffee, drop out of Discord, grab this patch right now: Vuln under attack
The Register • Shaun Nichols in San Francisco • 19 Jun 2019

Emergency security fix emitted for remote code exec hole exploited in the wild

Oracle has issued an emergency critical update to address a remote code execution vulnerability in its WebLogic Server component for Fusion Middleware – a flaw miscreants are exploiting in the wild to hijack systems. The programming blunder, designated CVE-2019-2729, is present in WebLogic Server versions 10.3.6.0.0, 12.1.3.0.0, and 12.2.1.3.0. The vulnerability itself is caused by a deserialization bug in the XMLDecoder for WebLogic Server Web Services. When exploited, a remote attacker can e...