mirror of
https://github.com/0xMarcio/cve.git
synced 2026-05-14 19:18:06 +02:00
144 lines
6.9 KiB
Markdown
144 lines
6.9 KiB
Markdown
### [CVE-2018-2628](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2628)
|
|

|
|

|
|

|
|
|
|
### Description
|
|
|
|
Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Core Components). Supported versions that are affected are 10.3.6.0, 12.1.3.0, 12.2.1.2 and 12.2.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
|
|
|
|
### POC
|
|
|
|
#### Reference
|
|
- https://www.exploit-db.com/exploits/44553/
|
|
- https://www.exploit-db.com/exploits/45193/
|
|
- https://www.exploit-db.com/exploits/46513/
|
|
|
|
#### Github
|
|
- https://github.com/0day666/Vulnerability-verification
|
|
- https://github.com/0xMJ/CVE-2018-2628
|
|
- https://github.com/0xT11/CVE-POC
|
|
- https://github.com/0xn0ne/weblogicScanner
|
|
- https://github.com/1120362990/vulnerability-list
|
|
- https://github.com/20142995/pocsuite3
|
|
- https://github.com/20142995/sectool
|
|
- https://github.com/9uest/CVE-2018-2628
|
|
- https://github.com/ARPSyndicate/cvemon
|
|
- https://github.com/ARPSyndicate/kenzer-templates
|
|
- https://github.com/AdeliaNitzsche/Java-Deserialization-Cheat-Sheet
|
|
- https://github.com/BabyTeam1024/cve-2018-2628
|
|
- https://github.com/BrittanyKuhn/javascript-tutorial
|
|
- https://github.com/Bywalks/WeblogicScan
|
|
- https://github.com/CVEDB/PoC-List
|
|
- https://github.com/CVEDB/awesome-cve-repo
|
|
- https://github.com/CVEDB/top
|
|
- https://github.com/Dido1960/Weblogic-CVE-2020-2551-To-Internet
|
|
- https://github.com/GhostTroops/TOP
|
|
- https://github.com/GrrrDog/Java-Deserialization-Cheat-Sheet
|
|
- https://github.com/Hatcat123/my_stars
|
|
- https://github.com/HimmelAward/Goby_POC
|
|
- https://github.com/JERRY123S/all-poc
|
|
- https://github.com/KimJun1010/WeblogicTool
|
|
- https://github.com/Lighird/CVE-2018-2628
|
|
- https://github.com/MacAsure/WL_Scan_GO
|
|
- https://github.com/Micr067/CMS-Hunter
|
|
- https://github.com/MrTcsy/Exploit
|
|
- https://github.com/Nervous/WebLogic-RCE-exploit
|
|
- https://github.com/Ostorlab/KEV
|
|
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
|
|
- https://github.com/PalindromeLabs/Java-Deserialization-CVEs
|
|
- https://github.com/Pamentierx/sus
|
|
- https://github.com/ParrotSec-CN/ParrotSecCN_Community_QQbot
|
|
- https://github.com/R0B1NL1N/CVE-2018-2628
|
|
- https://github.com/Scienza/SitoAndreaIdini
|
|
- https://github.com/SecWiki/CMS-Hunter
|
|
- https://github.com/Serendipity-Lucky/CVE-2018-2628
|
|
- https://github.com/SexyBeast233/SecBooks
|
|
- https://github.com/Shadowshusky/CVE-2018-2628all
|
|
- https://github.com/Threekiii/Awesome-Exploit
|
|
- https://github.com/Threekiii/Awesome-POC
|
|
- https://github.com/Threekiii/Vulhub-Reproduce
|
|
- https://github.com/Weik1/Artillery
|
|
- https://github.com/Z0fhack/Goby_POC
|
|
- https://github.com/ZTK-009/RedTeamer
|
|
- https://github.com/Zero094/Vulnerability-verification
|
|
- https://github.com/aedoo/CVE-2018-2628-MultiThreading
|
|
- https://github.com/aiici/weblogicAllinone
|
|
- https://github.com/angeloqmartin/Vulnerability-Assessment
|
|
- https://github.com/awake1t/Awesome-hacking-tools
|
|
- https://github.com/awsassets/weblogic_exploit
|
|
- https://github.com/bakery312/Vulhub-Reproduce
|
|
- https://github.com/cross2to/betaseclab_tools
|
|
- https://github.com/cscadoge/weblogic-cve-2018-2628
|
|
- https://github.com/cyberanand1337x/bug-bounty-2022
|
|
- https://github.com/developer3000S/PoC-in-GitHub
|
|
- https://github.com/djytmdj/Tool_Summary
|
|
- https://github.com/dr0op/WeblogicScan
|
|
- https://github.com/fengjixuchui/RedTeamer
|
|
- https://github.com/followboy1999/weblogic-deserialization
|
|
- https://github.com/forhub2021/weblogicScanner
|
|
- https://github.com/forlin/CVE-2018-2628
|
|
- https://github.com/hanc00l/some_pocsuite
|
|
- https://github.com/hanc00l/weblogic_unserialize_exploit
|
|
- https://github.com/hashtagcyber/Exp
|
|
- https://github.com/hawk-520/CVE-2018-2628
|
|
- https://github.com/hectorgie/PoC-in-GitHub
|
|
- https://github.com/hktalent/TOP
|
|
- https://github.com/hktalent/bug-bounty
|
|
- https://github.com/hmoytx/weblogicscan
|
|
- https://github.com/huan-cdm/secure_tools_link
|
|
- https://github.com/iceberg-N/WL_Scan_GO
|
|
- https://github.com/jas502n/CVE-2018-2628
|
|
- https://github.com/jas502n/CVE-2018-2893
|
|
- https://github.com/jbmihoub/all-poc
|
|
- https://github.com/jiangsir404/POC-S
|
|
- https://github.com/jiansiting/weblogic-cve-2018-2628
|
|
- https://github.com/kingkaki/weblogic-scan
|
|
- https://github.com/klausware/Java-Deserialization-Cheat-Sheet
|
|
- https://github.com/koutto/jok3r-pocs
|
|
- https://github.com/langu-xyz/JavaVulnMap
|
|
- https://github.com/likescam/CVE-2018-2628
|
|
- https://github.com/lnick2023/nicenice
|
|
- https://github.com/maya6/-scan-
|
|
- https://github.com/mishmashclone/GrrrDog-Java-Deserialization-Cheat-Sheet
|
|
- https://github.com/mmioimm/weblogic_test
|
|
- https://github.com/nihaohello/N-MiddlewareScan
|
|
- https://github.com/onewinner/VulToolsKit
|
|
- https://github.com/password520/RedTeamer
|
|
- https://github.com/qazbnm456/awesome-cve-poc
|
|
- https://github.com/qi4L/WeblogicScan.go
|
|
- https://github.com/rabbitmask/WeblogicScan
|
|
- https://github.com/rabbitmask/WeblogicScanLot
|
|
- https://github.com/rabbitmask/WeblogicScanServer
|
|
- https://github.com/reph0r/Poc-Exp-Tools
|
|
- https://github.com/reph0r/poc-exp
|
|
- https://github.com/reph0r/poc-exp-tools
|
|
- https://github.com/safe6Sec/WeblogicVuln
|
|
- https://github.com/safe6Sec/wlsEnv
|
|
- https://github.com/seethen/cve-2018-2628
|
|
- https://github.com/shengqi158/CVE-2018-2628
|
|
- https://github.com/skydarker/CVE-2018-2628
|
|
- https://github.com/soosmile/cms-V
|
|
- https://github.com/sp4zcmd/WeblogicExploit-GUI
|
|
- https://github.com/superfish9/pt
|
|
- https://github.com/tdcoming/Vulnerability-engine
|
|
- https://github.com/tdy218/ysoserial-cve-2018-2628
|
|
- https://github.com/trganda/starrlist
|
|
- https://github.com/victor0013/CVE-2018-2628
|
|
- https://github.com/w181496/weblogic-gadget-probe
|
|
- https://github.com/weeka10/-hktalent-TOP
|
|
- https://github.com/whoadmin/pocs
|
|
- https://github.com/wr0x00/Lizard
|
|
- https://github.com/wr0x00/Lsploit
|
|
- https://github.com/wrysunny/cve-2018-2628
|
|
- https://github.com/xbl3/awesome-cve-poc_qazbnm456
|
|
- https://github.com/xiaoyaovo/2021SecWinterTask
|
|
- https://github.com/yaklang/vulinone
|
|
- https://github.com/yige666/CMS-Hunter
|
|
- https://github.com/yyzsec/2021SecWinterTask
|
|
- https://github.com/zema1/oracle-vuln-crawler
|
|
- https://github.com/zhengjim/loophole
|
|
- https://github.com/zjxzjx/CVE-2018-2628-detect
|
|
- https://github.com/zzwlpx/weblogic
|
|
|