cve/2019/CVE-2019-0230.md

67 lines
2.9 KiB
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2019-0230](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0230)
![](https://img.shields.io/static/v1?label=Product&message=Apache%20Struts&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Remote%20Code%20Execution&color=brighgreen)
### Description
Apache Struts 2.0.0 to 2.5.20 forced double OGNL evaluation, when evaluated on raw user input in tag attributes, may lead to remote code execution.
### POC
#### Reference
- http://packetstormsecurity.com/files/160108/Apache-Struts-2.5.20-Double-OGNL-Evaluation.html
- http://packetstormsecurity.com/files/160721/Apache-Struts-2-Forced-Multi-OGNL-Evaluation.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
#### Github
- https://github.com/0day666/Vulnerability-verification
- https://github.com/0xT11/CVE-POC
- https://github.com/20142995/Goby
2024-07-25 21:25:12 +00:00
- https://github.com/20142995/nuclei-templates
2024-05-26 14:27:05 +02:00
- https://github.com/20142995/sectool
- https://github.com/360quake/papers
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ARPSyndicate/kenzer-templates
- https://github.com/Al1ex/CVE-2019-0230
- https://github.com/BH2UOL/CVE-2019-0230
- https://github.com/Elsfa7-110/kenzer-templates
- https://github.com/HimmelAward/Goby_POC
- https://github.com/IkerSaint/VULNAPP-vulnerable-app
- https://github.com/PrinceFPF/CVE-2019-0230
- https://github.com/SexyBeast233/SecBooks
- https://github.com/StarCrossPortal/scalpel
- https://github.com/Threekiii/Awesome-Exploit
- https://github.com/Threekiii/Awesome-POC
- https://github.com/Threekiii/Vulhub-Reproduce
2024-07-25 21:25:12 +00:00
- https://github.com/TrojanAZhen/Self_Back
2024-05-26 14:27:05 +02:00
- https://github.com/Z0fhack/Goby_POC
- https://github.com/Zero094/Vulnerability-verification
- https://github.com/alphaSeclab/sec-daily-2020
- https://github.com/anonymous364872/Rapier_Tool
- https://github.com/apif-review/APIF_tool_2024
- https://github.com/bakery312/Vulhub-Reproduce
- https://github.com/d4n-sec/d4n-sec.github.io
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/directcyber/playbook
- https://github.com/f8al/CVE-2019-0230-PoC
- https://github.com/fengziHK/CVE-2019-0230
- https://github.com/gh0st27/Struts2Scanner
- https://github.com/hectorgie/PoC-in-GitHub
- https://github.com/hyeonql/WHS
- https://github.com/hyeonql/WHS_Struts2-S2-059-
- https://github.com/ice0bear14h/struts2scan
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/pctF/vulnerable-app
- https://github.com/ramoncjs3/CVE-2019-0230
- https://github.com/s1kr10s/Apache-Struts-v4
- https://github.com/superlink996/chunqiuyunjingbachang
- https://github.com/techgyu/WHS
- https://github.com/tw-eason-tseng/CVE-2019-0230_Struts2S2-059
- https://github.com/woods-sega/woodswiki
- https://github.com/ynsmroztas/Apache-Struts-V4
- https://github.com/youcans896768/APIV_Tool