cve_2014_4210.py
1.06 KB / 2021-07-12 19:46:00
#!/usr/bin/env python3
# _*_ coding:utf-8 _*_
# CVE-2014-4210
# updated 2019/10/23
# by 0xn0ne
import sys
# 有漏洞的情况
# 端口不存在
# An error has occurred
# weblogic.uddi.client.structures.exception.XML_SoapException: Tried all: '1' addresses, but could not connect over HTTP to server: 'x.x.x.x', port: '80'
# 端口存在
# An error has occurred
# weblogic.uddi.client.structures.exception.XML_SoapException: Received a response from url: http://x.x.x.x:7001 which did not have a valid SOAP content-type: text/html.
from stars import universe, Star, target_type
from utils import http
@universe.groups()
class CVE_2014_4210(Star):
info = {
'NAME': 'webLogic server server-side-request-forgery',
'CVE': 'CVE-2014-4210',
'TAG': []
}
type = target_type.MODULE
def light_up(self, dip, dport, *args, **kwargs) -> (bool, dict):
r, data = http('http://{}:{}/uddiexplorer/SearchPublicRegistries.jsp'.format(dip, dport))
if r and r.status_code == 200:
return True, {'url': r.url}
return False, {}