(Add Vul: Struts2) Struts2-struts1-plugin 插件远程代码执行漏洞(S2-048)

This commit is contained in:
Medicean 2017-07-07 23:57:35 +08:00
parent 662798c6d8
commit b984b4b09a
6 changed files with 62 additions and 0 deletions

View File

@ -14,3 +14,4 @@
* [S2-devMode](./s2-devMode/)
* [S2-045](./s2-045/)
* [S2-046](./s2-046/)
* [S2-048](./s2-048/)

View File

@ -0,0 +1,14 @@
FROM tomcat:8-jre8
MAINTAINER Medici.Yan@Gmail.com
ENV WAR_URL http://oe58q5lw3.bkt.clouddn.com/s/struts2/struts2/s2-048.war
WORKDIR /tmp
RUN set -ex \
&& rm -rf /usr/local/tomcat/webapps/* \
&& chmod a+x /usr/local/tomcat/bin/*.sh \
&& wget -qO /usr/local/tomcat/webapps/ROOT.war $WAR_URL
EXPOSE 8080
CMD ["/usr/local/tomcat/bin/catalina.sh", "run"]

View File

@ -0,0 +1,47 @@
## Struts2-struts1-plugin 插件远程代码执行漏洞(S2-048) 环境
### 漏洞信息
* [S2-048 公告](https://cwiki.apache.org/confluence/display/WW/S2-048)
### 获取环境:
1. 拉取镜像到本地
```
$ docker pull medicean/vulapps:s_struts2_s2-048
```
2. 启动环境
```
$ docker run -d -p 80:8080 medicean/vulapps:s_struts2_s2-048
```
> `-p 80:8080` 前面的 80 代表物理机的端口,可随意指定。
### 使用与利用
访问 `http://你的 IP 地址:端口号/`
#### PoC
> 例如目标地址为http://127.0.0.1:32768/
1. 访问本例目标地址
> http://127.0.0.1:32768/integration/editGangster.action
![](poc-1.png)
2. 如下图在Gangster Name字段输入 Payload
![](poc-2.png)
3.提交后可看到表达式被执行
![](poc-3.png)
### 参考链接
* [S2-048 公告](https://cwiki.apache.org/confluence/display/WW/S2-048)
* [【漏洞分析】Struts2高危漏洞S2-048分析](http://bobao.360.cn/learning/detail/4078.html)

BIN
s/struts2/s2-048/poc-1.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 179 KiB

BIN
s/struts2/s2-048/poc-2.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 75 KiB

BIN
s/struts2/s2-048/poc-3.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 83 KiB