Objective:
Oracle officially released the July Critical patch update CPU (Critical patch update), which fixes a high-risk vulnerability that could cause remote code execution cve-2018-2894:
Http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
cve-2018-2894, a security researcher at China's National Internet Emergency Center Cncert Mingxuan Song and security researcher at Apple, David Litchfield, also submitted findings.
The National Internet Emergency Center Cncert issued a circular today July 19 stating that cve-2018-2894 is essentially an arbitrary file Upload vulnerability:
Https://mp.weixin.qq.com/s/y5JGmM-aNaHcs_6P9a-gRQ
Ideas:
Thinking the same. Read file removal space plus path initiation request remove filter. Extract the URL that matches the criteria
(I don't want to waste a line of things with a word)
Code:
Import requestsimport threadingimport oserror=[' 404 ', ' not Found ', ' Can't find ', ' safe dog ', ' No access ', ' 403 ']ok=[]bad=[]def Exploit (): headers={' user-agent ': ' mozilla/5.0 (Windows NT 6.1; WOW64) applewebkit/535.1 (khtml, like Gecko) chrome/14.0.835.163 safari/535.1 '} path= '/ws_utc/config.do ' Print (' [+]W eblogic arbitrary file Upload detection poc,data:https://mp.weixin.qq.com/s?__biz=mziwmdk1mjmymg==&mid= 2247484311&idx=1&sn=14da21743a447449896292bb367a322e&chksm= 96f41cfaa18395ec6182af2353ac55079ca9376ea8d2a2f8a1816c12e7e79b1081b0bc01d2fe&mpshare=1&scene=1& Srcid=0719et8nmmpfcrlu8vcgqreh#rd ') user=input (' Imported files: ') if os.path.exists (user): Print (' [+]file {} Ok '. Format (user) Else:print (' [-]not Found {} '. Format (user)] Exit () Ops=open (' {} '. Format (user), ' R ') For o in Ops.readlines (): sc= "". Join (O.split (' \ n ')) Urls=sc+path try:reques=requests.ge T (url=urls,headers=headers,allow_redirects=false,timeout=3) for E in Error:if reques.status_code==200 and E not in reques.text:pd= ' [+]debug url:{} '. Format (SC) if PD in Ok:continue ok.append (PD) PR Int (PD) else:nos= ' [-]not debug url:{} '. Format (SC) if NOS in Bad:cont Inue bad.append (NOS) print (NOS) except:passexploit ()
The test results are as follows:
Github:https://github.com/422926799/python/tree/master/weblogic%e4%bb%bb%e6%84%8f%e6%96%87%e4%bb%b6%e4%b8%8a%e4%bc%a0
Disclaimer: If you use this script for illegal attacks, or do black production has no trace of the relationship.
Please obey the law.
WebLogic arbitrary file Upload Remote Code execution Vulnerability (cve-2018-2894)------->>> arbitrary file Upload detection POC