info: name: Oracle WebLogic Server - Remote Code Execution via IIOP/T3 author: pranjalnegi severity: critical description: | Oracle WebLogic Server contains a critical vulnerability in the Core component of Oracle Fusion Middleware. The vulnerability affects versions 12.2.1.3.0, 12.2.1.4.0, and 14.1.1.0.0. Unauthenticated attackers can exploit this vulnerability through network access via IIOP and T3 protocols. The vulnerability allows complete compromise of the Oracle WebLogic Server. This is an easily exploitable vulnerability that requires no user interaction. impact: | Successful exploitation results in complete takeover of the Oracle WebLogic Server. Attackers can execute arbitrary code with WebLogic process privileges. This can lead to unauthorized data access and system compromise. The vulnerability enables lateral movement within the network infrastructure. No authentication is required to exploit this vulnerability. remediation: | Apply the security patches provided by Oracle in the Critical Patch Update (CPU) July 2020. Restrict network access to T3/IIOP ports (7001, 7002, 9001) using firewall rules. Implement proper network segmentation to isolate WebLogic servers. Monitor network traffic for suspicious T3/IIOP protocol communications. reference: - https://nvd.nist.gov/vuln/detail/CVE-2020-14644 - https://www.oracle.com/security-alerts/cpujul2020.html - https://github.com/0xkami/cve-2020-14644 - https://cisa.gov/known-exploited-vulnerabilities-catalog classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score:9.8 cve-id: CVE-2020-14644 cwe-id: CWE-502 epss-score:0.97384 epss-percentile:0.99904 cpe: cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:* metadata: max-request:3 vendor: oracle product: weblogic_server verified:true shodan-query: - product:"oracle weblogic" - http.title:"oracle weblogic" - port:7001,7002,9001 fofa-query: - title="oracle weblogic" - port="7001"|| port="7002"|| port="9001" google-query: intitle:"oracle weblogic server" tags: cve,cve2020,oracle,weblogic,rce,deserialization,iiop,t3,network,kev,critical
tcp: -inputs: -data:"t3 12.2.1\nAS:255\nHL:19\nMS:10000000\nPU:t3://{{Hostname}}:{{Port}}\n\n" host: -"{{Hostname}}" port:"7001,7002,9001" read-size:2048 matchers-condition: and matchers: -type: word words: -"HELO:"
-type: word words: -"12.2.1.3" -"12.2.1.4" -"14.1.1" condition:or
extractors: -type: regex part: body group:1 regex: -"HELO:([0-9.]+)"