You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This is a single CVE honeypot and as such IMO only useful as long the CVE is found widespread in the wild. This does not seem the case anymore. However you can change the T-Pot config files and include your own docker based honeypots.
I have not verified, but since the implementation of this CVE is very similar to many new CVE's in WebLogic, Suricata is likely to identify explosion attempts and new CVE's.
In this way, it is possible to close a number of CVE's. But this claim needs to be verified.
https://sissden.eu/blog/oracle-weblogic-0day Attention - as the exploitation of this vulnerability is very similar to CVE-2017-10271 (other RCE vulnerability in Oracle WebLogic Servers) and at the moment of blogpost writing we are still lacking very detailed information about CVE-2019-2725, we are not completely sure that the payload is executed via new vulnerability (however, we are almost certain that it is using CVE-2019-2725).
If my arguments have not changed your opinion, it is probably necessary to close the issue.
It would be great to add Oracle WebLogic honeypot
https://github.com/Cymmetria/weblogic_honeypot
ported to python3
https://github.com/rogofsky/weblogic_honeypot
The text was updated successfully, but these errors were encountered: