支持本站 — 捐款将帮助我们持续运营

目标: 1000 元,已筹: 1000

100.0%
获取后续新漏洞提醒登录后订阅
一、 漏洞 CVE-2017-5638 基础信息
漏洞信息

对漏洞内容有疑问?看看神龙的深度分析是否有帮助!
查看神龙十问 ↗

尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。

Vulnerability Title
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Description
The Jakarta Multipart parser in Apache Struts 2 2.3.x before 2.3.32 and 2.5.x before 2.5.10.1 has incorrect exception handling and error-message generation during file-upload attempts, which allows remote attackers to execute arbitrary commands via a crafted Content-Type, Content-Disposition, or Content-Length HTTP header, as exploited in the wild in March 2017 with a Content-Type header containing a #cmd= string.
来源: 美国国家漏洞数据库 NVD
CVSS Information
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Type
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Title
Apache Struts 2 输入验证错误漏洞
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Description
Apache Struts是美国阿帕奇(Apache)软件基金会的一个开源项目,是一套用于创建企业级Java Web应用的开源MVC框架,主要提供两个版本框架产品,Struts 1和Struts 2。 Apache Struts 2 2.3.32之前的2 2.3.x版本和2.5.10.1之前的2.5.x版本中的Jakarta Multipart解析器存在安全漏洞,该漏洞源于程序没有正确处理文件上传。远程攻击者可借助带有#cmd=字符串的特制Content-Type HTTP头利用该漏洞执行任意命令。
来源: 中国国家信息安全漏洞库 CNNVD
CVSS Information
N/A
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Type
N/A
来源: 中国国家信息安全漏洞库 CNNVD
受影响产品
厂商产品影响版本CPE订阅
Apache Software FoundationApache Struts 2.3.x before 2.3.32 -
二、漏洞 CVE-2017-5638 的公开POC
#POC 描述源链接神龙链接
1Struts2 S2-045(CVE-2017-5638)Vulnerability environment - http://www.mottoin.com/97954.htmlhttps://github.com/PolarisLab/S2-045POC详情
2Struts2 S2-045(CVE-2017-5638)Exp with GUIhttps://github.com/Flyteas/Struts2-045-ExpPOC详情
3Nonehttps://github.com/bongbongco/cve-2017-5638POC详情
4S2-045 漏洞 POC-TOOLS CVE-2017-5638https://github.com/jas502n/S2-045-EXP-POC-TOOLSPOC详情
5Telegram Bot to manage botnets created with struts vulnerability(CVE-2017-5638)https://github.com/mthbernardes/strutszeiroPOC详情
6Example PoC Code for CVE-2017-5638 | Apache Struts Exploit https://github.com/xsscx/cve-2017-5638POC详情
7Demo Application and Exploithttps://github.com/immunio/apache-struts2-CVE-2017-5638POC详情
8This is Valve for Tomcat7 to block Struts 2 Remote Code Execution vulnerability (CVE-2017-5638)https://github.com/Masahiro-Yamada/OgnlContentTypeRejectorValvePOC详情
9Tweaking original PoC (https://github.com/rapid7/metasploit-framework/issues/8064) to work on self-signed certificates https://github.com/aljazceru/CVE-2017-5638-Apache-Struts2POC详情
10test struts2 vulnerability CVE-2017-5638 in Mac OS Xhttps://github.com/sjitech/test_struts2_vulnerability_CVE-2017-5638POC详情
11Nonehttps://github.com/jrrombaldo/CVE-2017-5638POC详情
12CVE: 2017-5638 in different formatshttps://github.com/random-robbie/CVE-2017-5638POC详情
13detection for Apache Struts recon and compromise https://github.com/initconf/CVE-2017-5638_strutsPOC详情
14An exploit for Apache Struts CVE-2017-5638https://github.com/mazen160/struts-pwnPOC详情
15These are just some script which you can use to detect and exploit the Apache Struts Vulnerability (CVE-2017-5638)https://github.com/ret2jazzy/Struts-Apache-ExploitPackPOC详情
16A php based exploiter for CVE-2017-5638.https://github.com/lolwaleet/ExpStrutsPOC详情
17Example PHP Exploiter for CVE-2017-5638https://github.com/oktavianto/CVE-2017-5638-Apache-Struts2POC详情
18cve-2017-5638 Vulnerable site samplehttps://github.com/jrrdev/cve-2017-5638POC详情
19Struts2 RCE CVE-2017-5638 non-intrusive check shell scripthttps://github.com/opt9/StrutshockPOC详情
20Apache Struts (CVE-2017-5638) Shellhttps://github.com/falcon-lnhg/StrutsShellPOC详情
21Nonehttps://github.com/bhagdave/CVE-2017-5638POC详情
22st2-046-poc CVE-2017-5638https://github.com/jas502n/st2-046-pocPOC详情
23S2-046|S2-045: Struts 2 Remote Code Execution vulnerability(CVE-2017-5638)https://github.com/KarzsGHR/S2-046_S2-045_POCPOC详情
24CVE-2017-5638https://github.com/gsfish/S2-ReaperPOC详情
25Nonehttps://github.com/mcassano/cve-2017-5638POC详情
26Struts2 RCE CVE-2017-5638 CLI shellhttps://github.com/opt9/StrutscliPOC详情
27Strutsy - Mass exploitation of Apache Struts (CVE-2017-5638) vulnerabilityhttps://github.com/tahmed11/strutsyPOC详情
28Apache Struts 2.0 RCE vulnerability - Allows an attacker to inject OS commands into a web application through the content-type header https://github.com/payatu/CVE-2017-5638POC详情
29CVE-2017-5638https://github.com/Aasron/Struts2-045-ExpPOC详情
30An exploit for CVE-2017-5638 Remote Code Execution (RCE) Vulnerability in Apache Struts 2https://github.com/SpiderMate/StutsfiPOC详情
31An exploit (and library) for CVE-2017-5638 - Apache Struts2 S2-045 bug.https://github.com/jpacora/Struts2ShellPOC详情
32Nonehttps://github.com/AndreasKl/CVE-2017-5638POC详情
33Struts-RCE CVE-2017-5638https://github.com/riyazwalikar/struts-rce-cve-2017-5638POC详情
34Nonehttps://github.com/homjxi0e/CVE-2017-5638POC详情
35CVE-2017-5638 Test environmenthttps://github.com/eeehit/CVE-2017-5638POC详情
36Nonehttps://github.com/sUbc0ol/Apache-Struts-CVE-2017-5638-RCE-Mass-ScannerPOC详情
37Nonehttps://github.com/sUbc0ol/Apache-Struts2-RCE-Exploit-v2-CVE-2017-5638POC详情
38Exploit created by: R4v3nBl4ck end Pacmanhttps://github.com/R4v3nBl4ck/Apache-Struts-2-CVE-2017-5638-Exploit-POC详情
39Nonehttps://github.com/Xhendos/CVE-2017-5638POC详情
40Nonehttps://github.com/TamiiLambrado/Apache-Struts-CVE-2017-5638-RCE-Mass-ScannerPOC详情
41Check for Struts Vulnerability CVE-2017-5638https://github.com/invisiblethreat/strutserPOC详情
42Nonehttps://github.com/lizhi16/CVE-2017-5638POC详情
43 An exploit for Apache Struts CVE-2017-5638https://github.com/c002/Apache-StrutsPOC详情
44Struts2 Application Vulnerable to CVE-2017-5638. Explains how the exploit of the vulnerability works in relation to OGNL and the JakartaMultiPart parser.https://github.com/pr0x1ma-byte/cybersecurity-struts2POC详情
45Working POC for CVE 2017-5638https://github.com/cafnet/apache-struts-v2-CVE-2017-5638POC详情
46Struts02 s2-045 exploit programhttps://github.com/0x00-0x00/CVE-2017-5638POC详情
47This is a sort of Java porting of the Python exploit at: https://www.exploit-db.com/exploits/41570/.https://github.com/m3ssap0/struts2_cve-2017-5638POC详情
48Golang exploit for CVE-2017-5638https://github.com/Greynad/struts2-jakarta-injectPOC详情
49Apache Struts CVE-2017-5638 RCE exploitationhttps://github.com/ggolawski/struts-rcePOC详情
50Apache Struts 2.3.5 < 2.3.31 / 2.5 < 2.5.10 - Remote Code Execution - Shell Scripthttps://github.com/win3zz/CVE-2017-5638POC详情
51Nonehttps://github.com/leandrocamposcardoso/CVE-2017-5638-Mass-ExploitPOC详情
52Exploitable target to CVE-2017-5638https://github.com/Iletee/struts2-rcePOC详情
53Apache Struts version analyzer (Ansible) based on CVE-2017-5638https://github.com/andypitcher/check_strutsPOC详情
54Nonehttps://github.com/un4ckn0wl3z/CVE-2017-5638POC详情
55CVE-2017-5638 (PoC Exploits)https://github.com/colorblindpentester/CVE-2017-5638POC详情
56Demo app of THAT data broker's security breachhttps://github.com/injcristianrojas/cve-2017-5638POC详情
57(CVE-2017-5638) XworkStruts RCE Vuln test scripthttps://github.com/ludy-dev/XworkStruts-RCEPOC详情
58Exploitable target to CVE-2017-5638https://github.com/sonatype-workshops/struts2-rcePOC详情
59PoC for CVE: 2017-5638 - Apache Struts2 S2-045https://github.com/jongmartinez/CVE-2017-5638POC详情
60Nonehttps://github.com/Badbird3/CVE-2017-5638POC详情
61An implementation of CVE-2017-5638https://github.com/jptr218/struts_hackPOC详情
62Build the struts-2.3.31 (CVE-2017-5638) environmenthttps://github.com/testpilot031/vulnerability_struts-2.3.31POC详情
63This script is intended to validate Apache Struts 2 vulnerability (CVE-2017-5638), AKA Struts-Shock.https://github.com/readloud/CVE-2017-5638POC详情
64Nonehttps://github.com/Tankirat/CVE-2017-5638POC详情
65Nonehttps://github.com/0xConstant/CVE-2017-5638POC详情
66this exemple of application permet to test the vunerability CVE_2017-5638https://github.com/mfdev-solution/Exploit-CVE-2017-5638POC详情
67An exploit for CVE-2017-5638https://github.com/mritunjay-k/CVE-2017-5638POC详情
68A exploit for CVE-2017-5638. This exploit works on versions 2.3.5-2.3.31 and 2.5 – 2.5.10https://github.com/FredBrave/CVE-2017-5638-ApacheStruts2.3.5POC详情
69This is the Apache Struts CVE-2017-5638 struts 2 vulnerability. The same CVE that resulted in the equifax database breach.https://github.com/donaldashdown/Common-Vulnerability-and-ExploitPOC详情
70This project demonstrates a Web Application Firewall (WAF) simulation using Flask and a vulnerability checker for CVE-2017-5638. The WAF middleware blocks HTTP requests containing specific patterns, and the vulnerability checker tests for and exploits the Apache Struts 2 vulnerability (CVE-2017-5638).https://github.com/Nithylesh/web-application-firewall-POC详情
71This repository provides a PoC for CVE-2017-5638, a remote code execution vulnerability in Apache Struts 2, exploitable via a crafted Content-Type HTTP header.https://github.com/kloutkake/CVE-2017-5638-PoCPOC详情
72Struts2 Application Vulnerable to CVE-2017-5638. Explains how the exploit of the vulnerability works in relation to OGNL and the JakartaMultiPart parser.https://github.com/sighup1/cybersecurity-struts2POC详情
73Proof of concept of CVE-2017-5638 including the whole setup of the Apache vulnerable serverhttps://github.com/Xernary/CVE-2017-5638-POCPOC详情
74Nonehttps://github.com/banomaly/CVE-2017-5638POC详情
75Apache Struts 2.3.x before 2.3.32 and 2.5.x before 2.5.10.1 is susceptible to remote command injection attacks. The Jakarta Multipart parser has incorrect exception handling and error-message generation during file upload attempts, which can allow an attacker to execute arbitrary commands via a crafted Content-Type, Content-Disposition, or Content-Length HTTP header. This was exploited in March 2017 with a Content-Type header containing a #cmd= string. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2017/CVE-2017-5638.yamlPOC详情
76Nonehttps://github.com/Threekiii/Awesome-POC/blob/master/%E4%B8%AD%E9%97%B4%E4%BB%B6%E6%BC%8F%E6%B4%9E/Apache%20Struts2%20S2-046%20%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2017-5638.mdPOC详情
77Nonehttps://github.com/Threekiii/Awesome-POC/blob/master/%E4%B8%AD%E9%97%B4%E4%BB%B6%E6%BC%8F%E6%B4%9E/Apache%20Struts2%20S2-045%20%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2017-5638.mdPOC详情
78Nonehttps://github.com/toothbrushsoapflannelbiscuits/cve-2017-5638POC详情
79CVE-2017-5638 Exploit Rewritten In Python By haxerr9https://github.com/haxerr9/CVE-2017-5638POC详情
80Nonehttps://github.com/QHxDr-dz/CVE-2017-5638POC详情
81Real-time anomaly detection system for Apache Struts CVE-2017-5638 exploit using streaming analytics, 3-gram byte analysis, and Count-Min Sketch. Detects RCE attacks without signatures, with <5ms latency and <0.1% false positives. https://github.com/joidiego/Detection-struts-cve-2017-5638-detectorPOC详情
82Apache Struts2 CVE-2017-5638 (Safe Educational Demo)https://github.com/iampetru/PoC-CVE-2017-5638POC详情
83Nonehttps://github.com/MuhammadAbdullah192/CVE-2017-5638-Remote-Code-Execution-Apache-Struts2-EXPLOITATIONPOC详情
84A hands-on simulation of CVE-2017-5638 (Apache Struts2 RCE), showcasing exploit reproduction, OS-level command execution, and mitigations such as input sanitization and endpoint monitoring. Built in Python/Flask with Jupyter notebook demoshttps://github.com/kaylertee/Computer-Security-Equifax-2017POC详情
85CVE-2017-5638- PoC https://github.com/FozilCV/Apache-Struts2-CVE-2017-5638POC详情
86Telegram Bot to manage botnets created with struts vulnerability(CVE-2017-5638)https://github.com/btamburi/strutszeiroPOC详情
87A Deliberately Vulnerable Web Application built on Struts 2 (CVE-2017-5638) and Log4J (CVE-2021-44228) for testing and demonstration of OWASP Top 10 Web Application Security Risks: A06:2021-Vulnerable and Outdated Components.https://github.com/timothyjxhn/DeliberatelyVulnerableWebAppPOC详情
88Nonehttps://github.com/ACharaf06/CVE-2017-5638-Attack-and-DefensePOC详情
89Nonehttps://github.com/smancke/CVE-2017-5638POC详情
90Software Security & Privacy ~ Assignement 3 : CVE PoChttps://github.com/louislafosse/CVE-2017-5638-assignementPOC详情
91A practical lab demonstrating the exploitation of a critical Remote Code Execution (RCE) vulnerability in Apache Struts2 (CVE-2017-5638) using Vulhub Docker environments. Includes setup instructions and commands to run the vulnerable container.https://github.com/soufiane-benchahyd/vulhub-struts2POC详情
AI 生成 POC高级

未找到公开 POC。

登录以生成 AI POC
三、漏洞 CVE-2017-5638 的情报信息
Please 登录 to view more intelligence information
四、漏洞 CVE-2017-5638 的评论

暂无评论


发表评论