Oracle WebLogic Server Java Deserialization Remote Code Execution

Discussion in 'News Aggregator' started by Packet Storm, 30 Sep 2017.

  1. Packet Storm

    Packet Storm Guest

    This exploit tests the target Oracle WebLogic Server for Java Deserialization remote code execution vulnerability. The ysoserial payload causes the target to send Ping requests to the attacking machine. You can monitor ICMP ECHO requests on your attacking machine using TCPDump to know if the exploit was successful. Feel free to modify the payload (chunk2) with that of your choice. Do not worry about modifying the payload length each time you change the payload as this script will do it for you on the fly. Versions affected include 10.3.6.0, 12.1.2.0, 12.1.3.0 and 12.2.1.0.

    Continue reading...
     

Share This Page

Loading...