Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2018-2628 PoC — Oracle Fusion Middleware 代码问题漏洞

Source
Associated Vulnerability
Title:Oracle Fusion Middleware 代码问题漏洞 (CVE-2018-2628)
Description:Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Core Components). Supported versions that are affected are 10.3.6.0, 12.1.3.0, 12.2.1.2 and 12.2.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
Readme
# CVE-2018-2628漏洞批量检测脚本

### 使用方法
IP格式:
```python
192.168.31.1:443
192.168.31.100:443
```
* 命名为url.txt保存在同目录下执行脚本即可。
* 输出效果请自己注释!
* 这么执行:
```python
# 程序在Deepin下没问题,但是到了win10下的Ubuntu就不行了,改了一下
# 3是超时时间,单位秒
python weblogic_poc-cve-2018-2628-update.py 3
```

### weblogic_poc-cve-2018-2628-update.py
* 1、把测试的IP添加到列表,检测完成后输出。
* 2、凑合着用吧
* 3、自定义不存在漏洞网站的检测超时时间,而不是直接判断长度(不设置会一直while循环)

### weblogic_poc-cve-2018-2628.py
#### 须知
* 本脚本为绿盟出品,但一次只能检测一个网站,而且每次都要编辑代码...
* 所以我给她加了个批量检测的轮子,让她跑得更远。
* 多次测试,不存在漏洞的网站,接收的载荷请求长度为0,所以直接通过长度判断漏洞是否存在。因为不这么做,程序会一直while卡住。


参考:https://github.com/jas502n/CVE-2018-2628
File Snapshot

[4.0K] /data/pocs/de4ab51fe3296e4535f9d7932f479d66236773df ├── [1.1K] README.md ├── [7.5K] weblogic_poc-cve-2018-2628.py └── [8.2K] weblogic_poc-cve-2018-2628-update.py 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →