关联漏洞
            
        
            描述
            forked from https://github.com/s3xy/CVE-2017-10271. Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Security). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.1.0 and 12.2.1.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server.Modified by hanc00l
        
        
            介绍
            # weblogic_wls_wsat_rce
**Weblogic wls-wsat组件反序列化漏洞(CVE-2017-10271)利用脚本,参考[https://github.com/s3xy/CVE-2017-10271](https://github.com/s3xy/CVE-2017-10271)修改。**
+ 命令执行并回显
+ 直接上传shell
+ 在linux下weblogic 10.3.6.0测试OK
**使用方法及参数**
+ python weblogic_wls_wsat_exp.py -t 172.16.80.131:7001
```bash
usage: weblogic_wls_wsat_exp.py [-h] -t TARGET [-c CMD] [-o OUTPUT] [-s SHELL]
optional arguments:
  -h, --help            show this help message and exit
  -t TARGET, --target TARGET
                        weblogic ip and port(eg -> 172.16.80.131:7001)
  -c CMD, --cmd CMD     command to execute,default is "id"
  -o OUTPUT, --output OUTPUT
                        output file name,default is output.txt
  -s SHELL, --shell SHELL
                        local jsp file name to upload,and set -o xxx.jsp
```
        
        文件快照
        
            
                
 [4.0K]  /data/pocs/0385da86df69efb72c1c3497e8eeb84e285827d9
├── [1.1K]  exec.jsp
├── [ 885]  README.md
├── [1.9K]  weblogic_check_version.py
└── [5.7K]  weblogic_wls_wsat_exp.py
0 directories, 4 files
                
             
         
        备注
        
            
                1. 建议优先通过来源进行访问。
                2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
                3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。