CVE-2023-21839
时间: 2023-09-27 13:08:02 浏览: 77
CVE-2023-21839是一个Weblogic漏洞,可以导致远程代码执行。根据引用提供的信息,可以使用nc工具进行端口监听,用于接收反弹的shell。你可以在给出的GitHub链接中找到可用的工具。使用该工具前,需要先编译为可执行文件。另外,在引用中提到,可以使用docker-compose启动CVE-2023-21839漏洞环境。具体命令为sudo docker-compose up -d。<span class="em">1</span><span class="em">2</span><span class="em">3</span>
#### 引用[.reference_title]
- *1* *3* [CVE-2023-21839:Weblogic反序列化漏洞复现](https://blog.csdn.net/weixin_48539059/article/details/130101435)[target="_blank" data-report-click={"spm":"1018.2226.3001.9630","extra":{"utm_source":"vip_chatgpt_common_search_pc_result","utm_medium":"distribute.pc_search_result.none-task-cask-2~all~insert_cask~default-1-null.142^v92^chatsearchT0_1"}}] [.reference_item style="max-width: 50%"]
- *2* [CVE-2023-21839EXP可执行文件](https://download.csdn.net/download/qq_51577576/87559811)[target="_blank" data-report-click={"spm":"1018.2226.3001.9630","extra":{"utm_source":"vip_chatgpt_common_search_pc_result","utm_medium":"distribute.pc_search_result.none-task-cask-2~all~insert_cask~default-1-null.142^v92^chatsearchT0_1"}}] [.reference_item style="max-width: 50%"]
[ .reference_list ]