漏洞描述
Weblogic Web Service Test Page中⼀处任意⽂件上传漏洞,Web Service Test Page 在 "⽣产模式"下默认不开启,所以该漏洞有⼀定限制。
漏洞版本
weblogic 10.3.6.0
weblogic 12.1.3.0
weblogic 12.2.1.2
28 weblogic 12.2.1.3
环境搭建
cd vulhub-master/weblogic/CVE-2018-2894
docker-compose up -d
漏洞复现
这⾥环境后台密码是随机得,获取密码:docker-compose logs | grep password

1.设置Web服务测试开启
http://192.168.0.100:7001/console/login/LoginForm.jsp

域结构 -> base-domain -> ⾼级 -> 启动Web服务测试页


2.点击保存 , 进⼊ config.do ⽂件进⾏设置,将⽬录设置为 ws_utc 应⽤的静态⽂件css⽬录
/u01/oracle/user_projects/domains/base_domain/servers/AdminServer/tmp/_WL_internal/com.oracle.webservices.wls.ws-testclient-app-wls/4mcj4y/war/css

3.点击安全 , 点击添加

4.打开控制台, 找到对应时间戳

5.Webshell链接
时间戳_⽂件名.jsp
http://192.168.0.100:7001/ws_utc/css/config/keystore/1726923409516_shell.jsp
