### 简要描述:
x0_0x
### 详细说明:
大汉网络有限公司远程命令执行漏洞
子站:http://app.hanweb.com.cn/ ip:221.231.137.195
其 WebSphere 存在java反序列化远程命令执行漏洞,系统权限,直接威胁内网
漏洞地址:https://221.231.137.195:8880/
[<img src="https://images.seebug.org/upload/201601/0416300566b5ea2dfdef7011cff541edeb8414de.png" alt="d1.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201601/0416300566b5ea2dfdef7011cff541edeb8414de.png)
[<img src="https://images.seebug.org/upload/201601/041630154b78e7b37bb76beeccd553391c2f9d4f.png" alt="d2.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201601/041630154b78e7b37bb76beeccd553391c2f9d4f.png)
[<img src="https://images.seebug.org/upload/201601/0416302709af2673398bbfa5ab3ba01ffc35f136.png" alt="d3.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201601/0416302709af2673398bbfa5ab3ba01ffc35f136.png)
### 漏洞证明:
[<img src="https://images.seebug.org/upload/201601/041630381c9e501845b649304e86ff406d8ea412.png" alt="d1.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201601/041630381c9e501845b649304e86ff406d8ea412.png)
[<img src="https://images.seebug.org/upload/201601/0416304825c839f99f2f5ef212d2fca4b5e0092c.png" alt="d2.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201601/0416304825c839f99f2f5ef212d2fca4b5e0092c.png)
[<img src="https://images.seebug.org/upload/201601/0416305754a93312919802ced92b8209ccd2fdb2.png" alt="d3.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201601/0416305754a93312919802ced92b8209ccd2fdb2.png)
暂无评论