### 简要描述: x0_0x ### 详细说明: 大汉网络有限公司远程命令执行漏洞 子站:http://app.hanweb.com.cn/ ip:221.231.137.195 其 WebSphere 存在java反序列化远程命令执行漏洞,系统权限,直接威胁内网 漏洞地址:https://221.231.137.195:8880/ [<img src="https://images.seebug.org/upload/201601/0416300566b5ea2dfdef7011cff541edeb8414de.png" alt="d1.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201601/0416300566b5ea2dfdef7011cff541edeb8414de.png) [<img src="https://images.seebug.org/upload/201601/041630154b78e7b37bb76beeccd553391c2f9d4f.png" alt="d2.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201601/041630154b78e7b37bb76beeccd553391c2f9d4f.png) [<img src="https://images.seebug.org/upload/201601/0416302709af2673398bbfa5ab3ba01ffc35f136.png" alt="d3.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201601/0416302709af2673398bbfa5ab3ba01ffc35f136.png) ### 漏洞证明: [<img...
### 简要描述: x0_0x ### 详细说明: 大汉网络有限公司远程命令执行漏洞 子站:http://app.hanweb.com.cn/ ip:221.231.137.195 其 WebSphere 存在java反序列化远程命令执行漏洞,系统权限,直接威胁内网 漏洞地址:https://221.231.137.195:8880/ [<img src="https://images.seebug.org/upload/201601/0416300566b5ea2dfdef7011cff541edeb8414de.png" alt="d1.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201601/0416300566b5ea2dfdef7011cff541edeb8414de.png) [<img src="https://images.seebug.org/upload/201601/041630154b78e7b37bb76beeccd553391c2f9d4f.png" alt="d2.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201601/041630154b78e7b37bb76beeccd553391c2f9d4f.png) [<img src="https://images.seebug.org/upload/201601/0416302709af2673398bbfa5ab3ba01ffc35f136.png" alt="d3.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201601/0416302709af2673398bbfa5ab3ba01ffc35f136.png) ### 漏洞证明: [<img src="https://images.seebug.org/upload/201601/041630381c9e501845b649304e86ff406d8ea412.png" alt="d1.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201601/041630381c9e501845b649304e86ff406d8ea412.png) [<img src="https://images.seebug.org/upload/201601/0416304825c839f99f2f5ef212d2fca4b5e0092c.png" alt="d2.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201601/0416304825c839f99f2f5ef212d2fca4b5e0092c.png) [<img src="https://images.seebug.org/upload/201601/0416305754a93312919802ced92b8209ccd2fdb2.png" alt="d3.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201601/0416305754a93312919802ced92b8209ccd2fdb2.png)