Weblogic RCE by only one GET request — CVE-2020–14882 Analysis
Tags
attack-pattern: | Server - T1583.004 Server - T1584.004 Tool - T1588.002 |
Common Information
Type | Value |
---|---|
UUID | fb4ab5a1-dcf9-4f0a-a6d6-25eca21e7346 |
Fingerprint | d71fa55f5a03160c |
Analysis status | DONE |
Considered CTI value | 2 |
Text language | |
Published | Oct. 28, 2020, 10:24 a.m. |
Added to db | Feb. 18, 2023, 1:13 a.m. |
Last updated | Nov. 17, 2024, 5:56 p.m. |
Headline | Weblogic RCE by only one GET request — CVE-2020–14882 Analysis |
Title | Weblogic RCE by only one GET request — CVE-2020–14882 Analysis |
Detected Hints/Tags/Attributes | 26/1/12 |
Source URLs
URL Provider
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | CVE | 68 | cve-2020-14882 |
|
Details | CVE | 9 | cve-2020-2555 |
|
Details | CVE | 3 | cve-2020-2883 |
|
Details | Domain | 1 | weblogic.servlet.security |
|
Details | Domain | 3 | com.bea.core.repackaged.springframework.context.support |
|
Details | Domain | 154 | youtu.be |
|
Details | File | 40 | web.xml |
|
Details | File | 1 | struts-config.xml |
|
Details | File | 5 | bea.core |
|
Details | File | 1 | shellsession.exe |
|
Details | IPv4 | 60 | 12.2.1.3 |
|
Details | Url | 1 | https://youtu.be/jfvdoil0yta |