CVE-2020-14883
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Console). Supported versions that are affected are...
Basic Information
- CVE State
- PUBLISHED
- Reserved Date
- June 19, 2020
- Published Date
- October 21, 2020
- Last Updated
- September 26, 2024
- Vendor
- Oracle Corporation
- Product
- WebLogic Server
- Description
- Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Console). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 7.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).
- Tags
- Exploitation
- active
- Technical Impact
- total
CVSS Scores
CVSS v3.1
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
SSVC Information
References
Known Exploited Vulnerability Information
Source | Added Date |
---|---|
CISA | 2021-11-03 00:00:00 UTC |
Scanner Integrations
Scanner | URL | Date Detected |
---|---|---|
Metasploit | https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/weblogic_admin_handle_rce.rb | 2025-04-29 11:01:24 UTC |
Nuclei | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2020/CVE-2020-14883.yaml | 2025-04-26 00:00:00 UTC |
Potential Proof of Concepts
Warning: These PoCs have not been tested and could contain malware. Use at your own risk.
amacloudobia/CVE-2020-14883
Type: github • Created: 2024-06-07 08:50:53 UTC • Stars: 0
fan1029/CVE-2020-14883EXP
Type: github • Created: 2021-01-25 15:33:04 UTC • Stars: 5
B1anda0/CVE-2020-14883
Type: github • Created: 2020-11-11 08:52:28 UTC • Stars: 7
murataydemir/CVE-2020-14883
Type: github • Created: 2020-11-09 15:26:28 UTC • Stars: 13
Timeline
-
CVE ID Reserved
-
CVE Published to Public
-
Added to KEVIntel
-
Proof of Concept Exploit Available
-
Detected by Nuclei
-
Detected by Metasploit