2019-08-31 10:33:26 +08:00

99 lines
4.0 KiB
Markdown
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

软件作者Tide_RabbitMask
免责声明Pia!( -)ノ”(<。)
本工具仅用于安全测试,请勿用于非法使用,要乖哦~
V2.2简介:
提供weblogic批量检测功能收录几乎全部weblogic历史漏洞。
【没有遇到过weblogic批量检测工具的小朋友举起你的爪爪
PS
综上:V2.*系列不是V1.*的升级版,只是多进程批量版本。
对于当个目标站点的检测依然推荐您使用V1.*系列。
V 2.*系列特色:
1.多进程任务高效并发
2.简洁直观的监控界面
3.健全的日志记录功能
4.健全的异常处理机制
V 2.*功能详情:
#控制台路径泄露
Console
#SSRF
CVE-2014-4210
#JAVA反序列化
CVE-2016-0638
CVE-2016-3510
CVE-2017-3248
CVE-2018-2628
CVE-2018-2893
CVE-2019-2725
CVE-2019-2729
#任意文件上传
CVE-2018-2894
#XMLDecoder反序列化
CVE-2017-3506
CVE-2017-10271
V 2.1更新日志:
系列重新定义为WeblogicScanLot版本。
新增大量成熟POC与V1.3保持一致。
同样新版本完全舍弃Python2。
日志功能重构,更加健壮实用。
Kill旧版本window下多进程适应性BUG
V 2.2更新日志:
日志输出重做,之前的版本迁移导致日志并不适合作为批量扫描结果,
希望这次改动可以满足各位要求如有bug issue继续安排~感谢!
【软件使用Demo】
【此处只提供了本机单机扫描demo多线程实战场面太过血腥请在家长陪同下自行体验】
#控制台
=========================================================================
__ __ _ _ _ ____
\ \ / /__| |__ | | ___ __ _(_) ___ / ___| ___ __ _ _ __
\ \ /\ / / _ \ '_ \| |/ _ \ / _` | |/ __| \___ \ / __/ _` | '_ \
\ V V / __/ |_) | | (_) | (_| | | (__ ___) | (_| (_| | | | |
\_/\_/ \___|_.__/|_|\___/ \__, |_|\___| |____/ \___\__,_|_| |_|
|___/
By Tide_RabbitMask | V 2.2
Welcome To WeblogicScan !!!
Whoamirabbitmask.github.io
[*]任务加载成功,目标:127.0.0.1:7001
[*]任务检测完成,目标:127.0.0.1:7001
>>>>>End of task
=========================================================================
#日志文件
=========================================================================
2019-07-28 14:57:48,702 [+]127.0.0.1:7001 console address is exposed! The path is: http://127.0.0.1:7001/console/login/LoginForm.jsp Please try weak password blasting!
2019-07-28 14:57:48,717 [+]127.0.0.1:7001 UDDI module is exposed! The path is: http://127.0.0.1:7001/uddiexplorer/ Please verify the SSRF vulnerability!
2019-07-28 14:57:48,717 [-]127.0.0.1:7001 not detected CVE_2016_0638.
2019-07-28 14:57:48,717 [-]127.0.0.1:7001 not detected CVE_2016_3510.
2019-07-28 14:57:48,717 [-]127.0.0.1:7001 not detected CVE_2017_3248.
2019-07-28 14:57:48,725 [-]127.0.0.1:7001 not detected CVE-2017-3506.
2019-07-28 14:57:48,731 [-]127.0.0.1:7001 not detected CVE-2017-10271.
2019-07-28 14:57:48,731 [-]127.0.0.1:7001 not detected CVE_2018_2628.
2019-07-28 14:57:48,731 [-]127.0.0.1:7001 not detected CVE_2018_2893.
2019-07-28 14:57:48,735 [-]127.0.0.1:7001 not detected CVE-2018-2894.
2019-07-28 14:57:48,914 [+]127.0.0.1:7001 has a JAVA deserialization vulnerability:CVE-2019-2725.
2019-07-28 14:57:49,133 [+]And your current permission is:rabbitmask\rabbitmask.
2019-07-28 14:57:51,356 [+]127.0.0.1:7001 has a JAVA deserialization vulnerability:CVE-2019-2729.
2019-07-28 14:57:51,356 [+]And your current permission is:rabbitmask\rabbitmask.
=========================================================================