C:\Program Files\java\jboss-4.2.3.ga\server\default\deploy\http-invoker.sar\invoker.war\web-inf
server/$CONFIG/deploy/http-invoker.sar/http-invoker.war/web-inf/w
Eb.xml file that will be in the label
Url-pattern Modify to/* and comment out the two http-method.
1.weblogic Deserialization Vulnerability
The Java deserialization exploit tool verifies that the vulnerability is present in 6.
Now we can execute commands, file management,
Upload Shell
Encounter a problem, we choose Webshell upload, but upload we need a we can make Web access to the path, but where to find the path?
--------We can look up the Web path by looking at the picture properties on the page. Through the F12 source review, we can get the path to the relevant picture
Then find the physical path to the branding_login_weblogicconsole.gif file through our locally built JBoss environment
Get the pathC:\Oracle\Middleware\wlserver_10.3\server\lib\consoleapp\consolehelp\framework\skins\console\images
See the data can be said to find the absolute path, but only the server for the Linux system can be used
locate Branding_Login_WeblogicConsole.gif
Upload
Also found that not only the image directory to find the CSS directory can be
C:\Oracle\Middleware\wlserver_10.3\server\lib\consoleapp\consolehelp\framework\skins\console\css\1.jsp
2.JBoss Deserialization Vulnerability
and WebLogic similar, but also to find directories, look for pictures, local directory
WebLogic and JBoss Deserialization vulnerability