forked from https://github.com/s3xy/CVE-2017-10271. Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Security). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.1.0 and 12.2.1.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server.Modified by hanc00l# weblogic_wls_wsat_rce
**Weblogic wls-wsat组件反序列化漏洞(CVE-2017-10271)利用脚本,参考[https://github.com/s3xy/CVE-2017-10271](https://github.com/s3xy/CVE-2017-10271)修改。**
+ 命令执行并回显
+ 直接上传shell
+ 在linux下weblogic 10.3.6.0测试OK
**使用方法及参数**
+ python weblogic_wls_wsat_exp.py -t 172.16.80.131:7001
```bash
usage: weblogic_wls_wsat_exp.py [-h] -t TARGET [-c CMD] [-o OUTPUT] [-s SHELL]
optional arguments:
-h, --help show this help message and exit
-t TARGET, --target TARGET
weblogic ip and port(eg -> 172.16.80.131:7001)
-c CMD, --cmd CMD command to execute,default is "id"
-o OUTPUT, --output OUTPUT
output file name,default is output.txt
-s SHELL, --shell SHELL
local jsp file name to upload,and set -o xxx.jsp
```
[4.0K] /data/pocs/0385da86df69efb72c1c3497e8eeb84e285827d9
├── [1.1K] exec.jsp
├── [ 885] README.md
├── [1.9K] weblogic_check_version.py
└── [5.7K] weblogic_wls_wsat_exp.py
0 directories, 4 files