Oracle Weblogic - Remote Command Execution (CVE-2020-14883)
- Severity
- CVSSv3 Score
- 7.2
- Vulnerability description
Oracle Weblogic is affected by a Remote Code Execution vulnerability in the Console component. This vulnerability was found because of the simultaneous vulnerability of the server to CVE-2020-14882 which makes CVE-2020-14883 possible. By exploiting the CVE-2020-14882 vulnerability, an attacker can bypass authentication of the console component and afterward send commands via an MVEL expression under the handle of
com.tangosol.coherence.mvel2.sh.ShellSession
class. This may potentially cause remote code execution, allowing a malicious unauthenticated attacker to execute arbitrary code on the server.- Risk description
The risk exists that a remote unauthenticated attacker can fully compromise the Oracle Weblogic to steal confidential information, install ransomware, or pivot to the internal network.
- Exploit capabilities
Sniper can gain unauthenticated Remote Code Execution on the target system and extract multiple artefacts as evidence.
- Recommendation
Upgrade the Oracle Weblogic server to the latest version.
- Codename
- Not available
- Detectable with
- Network Scanner
- Exploitable with Sniper
- Yes
- Vuln date
- Oct 2020
- Published at
- Updated at
- Software Type
- Web server
- Vendor
- Oracle
- Product
- Weblogic