#!/usr/bin/env python3 # _*_ coding:utf-8 _*_ ''' ____ _ _ _ _ __ __ _ | _ \ __ _| |__ | |__ (_) |_| \/ | __ _ ___| | __ | |_) / _` | '_ \| '_ \| | __| |\/| |/ _` / __| |/ / | _ < (_| | |_) | |_) | | |_| | | | (_| \__ \ < |_| \_\__,_|_.__/|_.__/|_|\__|_| |_|\__,_|___/_|\_\ ''' import logging import sys import requests logging.basicConfig(filename='Weblogic.log', format='%(asctime)s %(message)s', filemode="w", level=logging.INFO) VUL=['CVE-2018-2894'] headers = {'user-agent': 'ceshi/0.0.1'} def islive(ur,port): url='http://' + str(ur)+':'+str(port)+'/ws_utc/resources/setting/options/general' r = requests.get(url, headers=headers) return r.status_code def run(url,port,index): if islive(url,port)!=404: logging.info('[+]{}:{} has a JAVA deserialization vulnerability:{}.'.format(url,port,VUL[index])) else: logging.info('[-]{}:{} not detected {}.'.format(url,port,VUL[index])) if __name__=="__main__": url = sys.argv[1] port = int(sys.argv[2]) run(url,port,0)