This video demonstrates how an unauthenticated attacker could execute commands on affected Oracle WebLogic Servers. We use a gadget chain constructed with the ExtractorComparator class to embed a specially crafted object in the T3 protocol.
For full details on the vulnerability, see the blog at https://www.zerodayinitiative.com/blo...