weblogic 漏洞环境搭建:docker/vulhub
weblogic 漏洞环境搭建
Weblogic系列漏洞整理————1、Weblogic安装:https://blog.csdn.net/fly_hps/article/details/83586298
JDK历史版本1.6、1.7、1.8、1.9下载教程: http://blog.sina.com.cn/s/blog_13887bf130102xd6k.html
JAVA SE 各版本Java下载地址:https://www.oracle.com/java/technologies/oracle-java-archive-downloads.html
JDK SE 1.7最终下载版本地址:https://download.oracle.com/otn/java/jdk/7u80-b15/jdk-7u80-windows-x64.exe?AuthParam=1588841321_d4042a49f17e24c1348f582a8b67c720
Oracle WebLogic Server 10.3.6包含 32 位 JVM 的 Windows x86 (1.5 GB) :https://download.oracle.com/otn/nt/middleware/11g/wls/1036/oepe-wls-indigo-installer-11.1.1.8.0.201110211138-10.3.6-win32.exe?AuthParam=1588834777_f2acb831904799caa086eb7a7fcb4e4f
http://download.oracle.com/otn/nt/middleware/11g/wls/1036/wls1036_generic.jar
---------------------------------------上面下载太慢了。下面我用阿里云服务器ECS
weblogic漏洞整改:https://www.cnblogs.com/lijingbo/p/8649420.html
漏洞环境快速搭建_Vulhub:https://www.jianshu.com/p/5e69341157d9 https://vulhub.org/
CVE-2017-10271漏洞漏洞复现:https://sys7em.info/content.html?id=I18PW6
Weblogic的安装与卸载:https://www.cnblogs.com/qlqwjy/p/9652616.html
weblogic卸载:https://jingyan.baidu.com/article/39810a239f22f9b636fda618.html
Weblogic 常见漏洞环境的搭建及其利用:https://xz.aliyun.com/t/140/
阿里云----Weblogic漏洞搭建CVE-2017-10271
1、搭建Docker---搭建Vulhub
1.1 【漏洞复现】Weblogic漏洞搭建与复现:CVE-2017-10271:https://cloud.tencent.com/developer/article/1590638
1.2 漏洞环境快速搭建_Vulhub:https://www.jianshu.com/p/5e69341157d9、https://vulhub.org/
CVE-2017-10271漏洞漏洞复现:https://www.freesion.com/article/8752447542/
Weblogic < 10.3.6 'wls-wsat' XMLDecoder 反序列化漏洞(CVE-2017-10271)https://vulhub.org/#/environments/weblogic/CVE-2017-10271/

1. firewalld的基本使用
启动: systemctl start firewalld
关闭: systemctl stop firewalld
查看状态: systemctl status firewalld
https://www.jianshu.com/p/e71ff4d60796
https://www.sohu.com/a/273017267_649850
https://www.cnblogs.com/grey-wolf/p/8961581.html
https://vulhub.org/#/environments/weblogic/CVE-2017-10271/
https://www.jianshu.com/p/5e69341157d9
https://cloud.tencent.com/developer/article/1590638
【Linux】使用docker搭建Apache/Nginx服务器: https://mp.weixin.qq.com/s?__biz=Mzg3MDE5OTIwNw==&mid=2247484250&idx=1&sn=7e4445c0bc4c6c3bf5351a866e823a83&chksm=ce903992f9e7b0843f5a17cf963348a17ff618badf14a07daa99eedc662e4bb46676ebcb9be5&scene=21#wechat_redirect
适合直接dockers+weblogic的情况:https://www.cnblogs.com/wenxingxu/p/9583899.html
------------------------------------------------------------------------
https://www.cnblogs.com/micr067/p/11609967.html
https://blog.csdn.net/qq_29647709/article/details/84892582
https://www.cnblogs.com/flokz/p/weblogic_SSRF.html
Docker容器安装weblogic12成功案例: https://www.cnblogs.com/wenxingxu/p/9583899.html
docker+weblogic1036
速度:https://www.cnblogs.com/h3zh1/p/12619796.html (其中pip install docker-compose==1.22)
docker search weblogic 10
docker pull tcseamdocker/weblogic1036
docker images

docker run -d -p 7001:7001 -p 7002:7002 7daba66f4008
docker ps

http://39.102.75.114:7001/console/

docker+vulhub+ CVE-2017-10271
速度:https://www.cnblogs.com/h3zh1/p/12619796.html (其中pip install docker-compose==1.22)
cd /root/vulhub/weblogic/CVE-2017-10271
docker-compose build
docker-compose up -d
docker-compose logs | grep password 查看环境账号密码
http://39.102.75.114:7001/console/

1、初步判断:访问 http://39.102.75.114:7001/wls-wsat/CoordinatorPortType11,存在下图则说明可能存在漏洞

总部的人下载的检测工具:https://gitee.com/RichChigga/Middleware-Vulnerability-detection/tree/master/javaserializetools
本地vmware搭建win7+JDK+python3.7环境






/var/lib/docker/overlay2/5e0004faffdf93ab40475d7878362cdebac1533a21ca26cb2ef9ca20b2e14bda/merged/root/Oracle/Middleware/user_projects/domains/base_domain/servers/AdminServer/tmp/_WL_internal/wls-wsat/54p17w/war/test.jsp
/var/lib/docker/overlay2/5e0004faffdf93ab40475d7878362cdebac1533a21ca26cb2ef9ca20b2e14bda/diff/root/Oracle/Middleware/user_projects/domains/base_domain/servers/AdminServer/tmp/_WL_internal/wls-wsat/54p17w/war/test.jsp




rm /var/lib/docker/overlay2/5e0004faffdf93ab40475d7878362cdebac1533a21ca26cb2ef9ca20b2e14bda/merged/root/Oracle/Middleware/user_projects/domains/base_domain/servers/AdminServer/tmp/_WL_internal/wls-wsat/54p17w/war/test.jsp


一般查看有无上传的地址:http://39.102.75.114:7001/_async/test.jsp
http://39.102.75.114:7001/wls-wsat/test.jsp
· go语言实现终端里的倒计时
· 如何编写易于单元测试的代码
· 10年+ .NET Coder 心语,封装的思维:从隐藏、稳定开始理解其本质意义
· .NET Core 中如何实现缓存的预热?
· 从 HTTP 原因短语缺失研究 HTTP/2 和 HTTP/3 的设计差异
· 使用C#创建一个MCP客户端
· 分享一个免费、快速、无限量使用的满血 DeepSeek R1 模型,支持深度思考和联网搜索!
· ollama系列1:轻松3步本地部署deepseek,普通电脑可用
· 基于 Docker 搭建 FRP 内网穿透开源项目(很简单哒)
· 按钮权限的设计及实现