Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.
Path: blob/master/documentation/modules/exploit/multi/misc/weblogic_deserialize_rawobject.md
Views: 11784
Description
Oracle WebLogic Server v10.3.6.0, v12.1.2.0, v12.1.3.0, and v12.2.1.0 are vulnerable to a deserialization vulnerability (CVE 2015-4852), which can be used to execute code on vulnerable systems. An unauthenticated user with network access via T3 could exploit the vulnerability. This module has been tested against Oracle WebLogic Server v10.3.6.0 and v12.1.3.0 running on Windows 7 x64 using JDK v7u80.
Note that successful exploitation will output the following warning to the admin server console:
Setup (Windows)
Use the following steps to install a vulnerable instance of WebLogic v10.3.6.0 on a Windows 7 SP1 x64 system.
Install the Java SE Development Kit 7 Update 80 (64-bit version) from [Oracle][1] (use the
jdk-7u80-windows-x64.exe
installer). Leave all options at their default values.Download "Oracle WebLogic Server 10.3.6" from their [site][2]. Select the generic installer under the "Installers with Oracle WebLogic Server and Oracle Coherence" section, the file is named
wls1036_generic.jar
. You may need to register an account.From an administrative command prompt, use java to run the jar file.
Run:
"C:\Program Files\Java\jdk1.7.0_80\bin\java.exe" -jar wls1036_generic.jar
Leave all options at their default values.
OPTIONAL: When prompted to register for security updates, uncheck "I wish to receive security updates via My Oracle Support" and confirm that you do in fact wish to remain uninformed of critical security issues.
When prompted to select the installation type, use the default "Typical" setting.
At the end, leave "Run Quickstart" checked and select "Done".
From the Quick Start menu, select "Getting started with WebLogic Server 10.3.6" to launch the configuration wizard.
Complete this wizard using all of the default values.
When prompted to enter a password, set any desired value. Knowledge of the password is not required in order to demonstrate this vulnerability or modify any settings in the future.
Start the service by navigating to the Start Menu and selecting:
All Programs > Oracle WebLogic > User Projects > base_domain > Start Admin Server for WebLogic
.
Setup (Linux)
Use the following steps to install a vulnerable instance of WebLogic v10.3.6.0 in a Docker container. The same image used to demonstrate [CVE-2017-10271][3] can be used.
Use git to clone the vulhub/vulhub repository from GitHub.
Run:
git clone https://github.com/vulhub/vulhub
From within the
weblogic/CVE-2017-10271
subdirectory, use Docker to run the image.Run:
docker-compose up -d
TCP port 7001 should now be listening on the host machine.
Vulnerable Application
Oracle WebLogic Server v10.3.6.0, v12.1.2.0, v12.1.3.0, and v12.2.1.0.
Verification Steps
./msfconsole -q
use exploit/multi/misc/weblogic_deserialize_rawobject
set rhosts <rhost>
set rport <srvport>
exploit