漏洞描述 【漏洞对象】Weblogic<br>【涉及版本】v10.3.6.0v12.1.3.0v12.2.1.3<br>【漏洞描述】<br><br>远程攻击者可利用该漏洞在未授权的情况下发送攻击数据,通过T3协议在WeblogicServer中执行反序列化操作,利用RMI(远程方法调用) 机制的缺陷,通过 JRMP 协议达到执行任意反序列化 payload 的目的。
相关漏洞推荐 weblogic-ssrf: weblogic ssrf Weblogic uddiexplorer 服务端请求伪造漏洞(CVE-2014-4210) POC CVE-2014-4210: Oracle Weblogic - Server-Side Request Forgery POC CVE-2017-10271: Oracle WebLogic Server - Remote Command Execution POC CVE-2017-3506: Oracle Fusion Middleware Weblogic Server - Remote OS Command Execution POC CVE-2018-2894: Oracle WebLogic Server - Remote Code Execution POC CVE-2019-2725: Oracle WebLogic Server - Remote Command Execution POC CVE-2019-2729: Oracle WebLogic Server Administration Console - Remote Code Execution POC CVE-2020-14750: Oracle WebLogic Server - Remote Command Execution POC CVE-2020-14882: Oracle Weblogic Server - Remote Command Execution POC CVE-2020-14883: Oracle Fusion Middleware WebLogic Server Administration Console - Remote Code Execution POC CVE-2020-2551: Oracle WebLogic Server - Remote Code Execution POC CVE-2022-21371: Oracle WebLogic Server Local File Inclusion