mirror of
https://github.com/gobysec/GobyVuls.git
synced 2025-05-05 10:16:59 +00:00
add S2-061
This commit is contained in:
parent
099ff419ff
commit
04c173e86f
12
Struts2/S2-061(CVE-2020-17530)/README.md
Normal file
12
Struts2/S2-061(CVE-2020-17530)/README.md
Normal file
@ -0,0 +1,12 @@
|
||||
# S2-061 (CVE-2020-17530) Remote Code Execution Vulnerability
|
||||
|
||||
Forced OGNL evaluation, when evaluated on raw user input in tag attributes, may lead to remote code execution. Affected software : Apache Struts 2.0.0 - Struts 2.5.25.
|
||||
|
||||
**Affected version**: Apache Struts 2.0.0 - Struts 2.5.25
|
||||
|
||||
**[FOFA](https://fofa.so/result?qbase64=YXBwPSJTdHJ1dHMyIg%3D%3D) query rule**: app="Struts2"
|
||||
|
||||
# Demo
|
||||
|
||||

|
||||
|
BIN
Struts2/S2-061(CVE-2020-17530)/S2-061.gif
Normal file
BIN
Struts2/S2-061(CVE-2020-17530)/S2-061.gif
Normal file
Binary file not shown.
After Width: | Height: | Size: 408 KiB |
Loading…
x
Reference in New Issue
Block a user