Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Console). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
This indicates an attack attempt to exploit an Authentication Bypass Vulnerability in Oracle WebLogic Server. The vulnerability is due to an error in the vulnerable application when handling a maliciously crafted request. This vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server.
Oracle WebLogic Server 10.3.6.0.0
Oracle WebLogic Server 12.1.3.0.0
Oracle WebLogic Server 12.2.1.3.0
Oracle WebLogic Server 12.2.1.4.0
Oracle WebLogic Server 14.1.1.0.0
System Compromise: Remote attackers can gain control of vulnerable systems.
Apply the most recent upgrade or patch from the vendor.
https://www.oracle.com/security-alerts/cpuoct2020.html
CVE Infomation | Exploits or more Infomation |
---|---|
mitre | EXPLOIT DATABASE |
NVD | 0day.today |
vulmon.com | github |
CVE Details | |
JVN ENG JPN | |
Reconshell |
Software Tag: Oracle(1 tweets) Weblogic(1 tweets)
List of frequently cited URLs
User | URL | Info Source | Date |
---|---|---|---|
Addidici | http://dirknachbar.blogspot.com/2020/11/cve-2020-14750-orac... | Source Addidici 1589600154390233088 | 2022/11/07 |
Addidici | http://dirknachbar.blogspot.com/2020/11/cve-2020-14750-orac... | Source Addidici 1589600154390233088 | 2022/11/07 |
List of frequently cited URLs
URL | Num of Times Referred to |
---|---|
securityaffairs.co | 12 |
ift.tt | 6 |
www.oracle.com | 5 |
www.helpnetsecurity.com | 5 |
twitter.com | 4 |
www.zdnet.com | 4 |
github.com | 3 |
www.ipa.go.jp | 3 |
www.ncsc.gov.uk | 3 |
us-cert.cisa.gov | 3 |
www.checkpoint.com | 3 |
research.trendmicro.com | 3 |
www.bleepingcomputer.com | 3 |
User | URL | Info Source |
---|---|---|
Addidici | dirknachbar.blogspot.com | Show Tweet |
Addidici | dirknachbar.blogspot.com | Show Tweet |
Name | URL |
---|---|
pprietosanchez/CVE-2020-14750 | https://github.com/pprietosanchez/CVE-2020-14750 |
NS-Sp4ce/CVE-2020-14882 | https://github.com/NS-Sp4ce/CVE-2020-14882 |
kkhacklabs/CVE-2020-14750 | https://github.com/kkhacklabs/CVE-2020-14750 |
corelight/CVE-2020-14882-weblogicRCE | https://github.com/corelight/CVE-2020-14882-weblogicRCE |
Name | URL |
---|---|
pprietosanchez/CVE-2020-14750 | github.com |
NS-Sp4ce/CVE-2020-14882 | github.com |
kkhacklabs/CVE-2020-14750 | github.com |
corelight/CVE-2020-14882-weblogicRCE | github.com |