/CVE-2020-14882-weblogicRCE

Detection of RCE in Oracle's WebLogic Server CVE-2020-14882 / CVE-2020-14750

Primary LanguageZeekBSD 3-Clause "New" or "Revised" LicenseBSD-3-Clause

Detection of RCE in Oracle's "WebLogic Server" CVE-2020-14882 / CVE-2020-14750

Summary:

Detection of attempts to exploit CVE-2020-14882 and CVE-2020-14750 - Unauthenticated RCE in Oracle's Weblogic Server.

References:

Oracle's advisories:

Exploit PoC (in Vietnamese):

Vendor write-ups including exploitation in the wild:

Notices raised:

Detection scope notice msg notice sub field Fidelity of alert
POST method successful exploit Potentially successful exploit of Oracle's WebLogic Server Remote Code Execution vulnerability (CVE-2020-14882 and CVE-2020-14750) using POST method. Refer to https://www.oracle.com/security-alerts/cpuoct2020traditional.html and https://www.oracle.com/security-alerts/alert-cve-2020-14750.html. See sub field for artifacts. [REDACTED due to TLP of source pcap] HIGH
GET method successful exploit Potentially successful exploit of Oracle's WebLogic Server Remote Code Execution vulnerability (CVE-2020-14882 and CVE-2020-14750) using GET method. Refer to https://www.oracle.com/security-alerts/cpuoct2020traditional.html and https://www.oracle.com/security-alerts/alert-cve-2020-14750.html. See sub field for artifacts. [REDACTED due to TLP of source pcap] HIGH
POST method unsuccessful attempt Unsuccessful exploit attempt of Oracle's WebLogic Server Remote Code Execution vulnerability (CVE-2020-14882 and CVE-2020-14750) using POST method. Refer to https://www.oracle.com/security-alerts/cpuoct2020traditional.html and https://www.oracle.com/security-alerts/alert-cve-2020-14750.html. See sub field for artifacts. [REDACTED due to TLP of source pcap] HIGH
GET method unsuccessful attempt Unsuccessful exploit attempt of Oracle's WebLogic Server Remote Code Execution vulnerability (CVE-2020-14882 and CVE-2020-14750) using GET method. Refer to https://www.oracle.com/security-alerts/cpuoct2020traditional.html and https://www.oracle.com/security-alerts/alert-cve-2020-14750.html. See sub field for artifacts. [REDACTED due to TLP of source pcap] HIGH

Usage, notes and recommendations:

  • This package can include a sample of the Server's response in the notice. This is to assist incident responders triage the detection. If you wish to have the server response artifacts included in your notice.log, change this option in scripts/main.zeek from the default F to T like so:
    const include_exploited_server_response_in_notice: bool = T;

  • By default this package detects on all TCP ports, not just the default port 7001/tcp. To change the behavior to only detect on the specified port, use these options in scripts/main.zeek:
    const detect_default_port_only: bool = T;
    const default_port: port = 7001/tcp;

  • By default this package detects ALL exploit attempts - successful and unsuccessful. To change the behavior to only detect successful exploits, use these options in scripts/main.zeek:
    const detect_unsuccessful_attempts: bool = F;

  • If you have scanners that you wish to exclude from detection, add them to the scripts/scanner_exclude_from_detection.zeek file.

  • To run against a pcap you already have zeek -Cr your.pcap scripts/__load__.zeek

  • This package will run in clustered or non clustered environments.

Feedback

  • As details emerge, we are keen to improve this package for the benefit of the community, please feel free to contact the author with any suggestions and feedback.