mirror of
https://github.com/Medicean/VulApps.git
synced 2025-06-21 02:10:43 +00:00
(Add Vul: Struts2) S2-045
This commit is contained in:
parent
9ba72f639f
commit
4b3be9e4cc
47
_posts/2017-03-07-s_struts2_s2-045.md
Normal file
47
_posts/2017-03-07-s_struts2_s2-045.md
Normal file
@ -0,0 +1,47 @@
|
||||
---
|
||||
layout: post
|
||||
title: "Struts2 Jakarta 插件远程代码执行漏洞(S2-045)"
|
||||
date: 2017-03-07 16:15:22 +0800
|
||||
image: '/assets/img/'
|
||||
description: 'Struts2 Jakarta 插件存在远程代码执行漏洞,攻击者只需发送一个精心构造的恶意请求,即可执行任意代码'
|
||||
main-class: 'hole'
|
||||
color: '#B31917'
|
||||
tags:
|
||||
- Struts2
|
||||
- RCE
|
||||
categories:
|
||||
- Struts2
|
||||
twitter_text: 'Struts2 Jakarta 插件存在远程代码执行漏洞,攻击者只需发送一个精心构造的恶意请求,即可执行任意代码'
|
||||
introduction: 'Struts2 Jakarta 插件存在远程代码执行漏洞,攻击者只需发送一个精心构造的恶意请求,即可执行任意代码'
|
||||
---
|
||||
|
||||
### 漏洞信息
|
||||
|
||||
* [S2-045 公告](https://cwiki.apache.org/confluence/display/WW/S2-045)
|
||||
|
||||
### 获取环境:
|
||||
|
||||
1. 拉取镜像到本地
|
||||
```bash
|
||||
$ docker pull medicean/vulapps:s_struts2_s2-045
|
||||
```
|
||||
|
||||
2. 启动环境
|
||||
```bash
|
||||
$ docker run -d -p 80:8080 medicean/vulapps:s_struts2_s2-045
|
||||
```
|
||||
> `-p 80:8080` 前面的 80 代表物理机的端口,可随意指定。
|
||||
|
||||
### 使用与利用
|
||||
|
||||
访问 `http://你的 IP 地址:端口号/`
|
||||
|
||||
#### [PoC](https://github.com/Medicean/VulApps/raw/master/s/struts2/s2-045/poc.py)
|
||||
|
||||
运行 `poc.py`
|
||||
|
||||
```bash
|
||||
$ python poc.py <url> <cmd>
|
||||
```
|
||||
|
||||

|
Loading…
x
Reference in New Issue
Block a user