1 |
Struts2 S2-045(CVE-2017-5638)Vulnerability environment - http://www.mottoin.com/97954.html |
https://github.com/PolarisLab/S2-045 |
POC详情
|
2 |
Struts2 S2-045(CVE-2017-5638)Exp with GUI |
https://github.com/Flyteas/Struts2-045-Exp |
POC详情
|
3 |
None |
https://github.com/bongbongco/cve-2017-5638 |
POC详情
|
4 |
S2-045 漏洞 POC-TOOLS CVE-2017-5638 |
https://github.com/jas502n/S2-045-EXP-POC-TOOLS |
POC详情
|
5 |
Telegram Bot to manage botnets created with struts vulnerability(CVE-2017-5638) |
https://github.com/mthbernardes/strutszeiro |
POC详情
|
6 |
Example PoC Code for CVE-2017-5638 | Apache Struts Exploit |
https://github.com/xsscx/cve-2017-5638 |
POC详情
|
7 |
Demo Application and Exploit |
https://github.com/immunio/apache-struts2-CVE-2017-5638 |
POC详情
|
8 |
This is Valve for Tomcat7 to block Struts 2 Remote Code Execution vulnerability (CVE-2017-5638) |
https://github.com/Masahiro-Yamada/OgnlContentTypeRejectorValve |
POC详情
|
9 |
Tweaking original PoC (https://github.com/rapid7/metasploit-framework/issues/8064) to work on self-signed certificates |
https://github.com/aljazceru/CVE-2017-5638-Apache-Struts2 |
POC详情
|
10 |
test struts2 vulnerability CVE-2017-5638 in Mac OS X |
https://github.com/sjitech/test_struts2_vulnerability_CVE-2017-5638 |
POC详情
|
11 |
None |
https://github.com/jrrombaldo/CVE-2017-5638 |
POC详情
|
12 |
CVE: 2017-5638 in different formats |
https://github.com/random-robbie/CVE-2017-5638 |
POC详情
|
13 |
detection for Apache Struts recon and compromise |
https://github.com/initconf/CVE-2017-5638_struts |
POC详情
|
14 |
An exploit for Apache Struts CVE-2017-5638 |
https://github.com/mazen160/struts-pwn |
POC详情
|
15 |
These are just some script which you can use to detect and exploit the Apache Struts Vulnerability (CVE-2017-5638) |
https://github.com/ret2jazzy/Struts-Apache-ExploitPack |
POC详情
|
16 |
A php based exploiter for CVE-2017-5638. |
https://github.com/lolwaleet/ExpStruts |
POC详情
|
17 |
Example PHP Exploiter for CVE-2017-5638 |
https://github.com/oktavianto/CVE-2017-5638-Apache-Struts2 |
POC详情
|
18 |
cve-2017-5638 Vulnerable site sample |
https://github.com/jrrdev/cve-2017-5638 |
POC详情
|
19 |
Struts2 RCE CVE-2017-5638 non-intrusive check shell script |
https://github.com/opt9/Strutshock |
POC详情
|
20 |
Apache Struts (CVE-2017-5638) Shell |
https://github.com/falcon-lnhg/StrutsShell |
POC详情
|
21 |
None |
https://github.com/bhagdave/CVE-2017-5638 |
POC详情
|
22 |
st2-046-poc CVE-2017-5638 |
https://github.com/jas502n/st2-046-poc |
POC详情
|
23 |
S2-046|S2-045: Struts 2 Remote Code Execution vulnerability(CVE-2017-5638) |
https://github.com/KarzsGHR/S2-046_S2-045_POC |
POC详情
|
24 |
CVE-2017-5638 |
https://github.com/gsfish/S2-Reaper |
POC详情
|
25 |
None |
https://github.com/mcassano/cve-2017-5638 |
POC详情
|
26 |
Struts2 RCE CVE-2017-5638 CLI shell |
https://github.com/opt9/Strutscli |
POC详情
|
27 |
Strutsy - Mass exploitation of Apache Struts (CVE-2017-5638) vulnerability |
https://github.com/tahmed11/strutsy |
POC详情
|
28 |
Apache Struts 2.0 RCE vulnerability - Allows an attacker to inject OS commands into a web application through the content-type header |
https://github.com/payatu/CVE-2017-5638 |
POC详情
|
29 |
CVE-2017-5638 |
https://github.com/Aasron/Struts2-045-Exp |
POC详情
|
30 |
An exploit for CVE-2017-5638 Remote Code Execution (RCE) Vulnerability in Apache Struts 2 |
https://github.com/SpiderMate/Stutsfi |
POC详情
|
31 |
An exploit (and library) for CVE-2017-5638 - Apache Struts2 S2-045 bug. |
https://github.com/jpacora/Struts2Shell |
POC详情
|
32 |
None |
https://github.com/AndreasKl/CVE-2017-5638 |
POC详情
|
33 |
Struts-RCE CVE-2017-5638 |
https://github.com/riyazwalikar/struts-rce-cve-2017-5638 |
POC详情
|
34 |
None |
https://github.com/homjxi0e/CVE-2017-5638 |
POC详情
|
35 |
CVE-2017-5638 Test environment |
https://github.com/eeehit/CVE-2017-5638 |
POC详情
|
36 |
None |
https://github.com/sUbc0ol/Apache-Struts-CVE-2017-5638-RCE-Mass-Scanner |
POC详情
|
37 |
None |
https://github.com/sUbc0ol/Apache-Struts2-RCE-Exploit-v2-CVE-2017-5638 |
POC详情
|
38 |
Exploit created by: R4v3nBl4ck end Pacman |
https://github.com/R4v3nBl4ck/Apache-Struts-2-CVE-2017-5638-Exploit- |
POC详情
|
39 |
None |
https://github.com/Xhendos/CVE-2017-5638 |
POC详情
|
40 |
None |
https://github.com/TamiiLambrado/Apache-Struts-CVE-2017-5638-RCE-Mass-Scanner |
POC详情
|
41 |
Check for Struts Vulnerability CVE-2017-5638 |
https://github.com/invisiblethreat/strutser |
POC详情
|
42 |
None |
https://github.com/lizhi16/CVE-2017-5638 |
POC详情
|
43 |
An exploit for Apache Struts CVE-2017-5638 |
https://github.com/c002/Apache-Struts |
POC详情
|
44 |
Struts2 Application Vulnerable to CVE-2017-5638. Explains how the exploit of the vulnerability works in relation to OGNL and the JakartaMultiPart parser. |
https://github.com/pr0x1ma-byte/cybersecurity-struts2 |
POC详情
|
45 |
Working POC for CVE 2017-5638 |
https://github.com/cafnet/apache-struts-v2-CVE-2017-5638 |
POC详情
|
46 |
Struts02 s2-045 exploit program |
https://github.com/0x00-0x00/CVE-2017-5638 |
POC详情
|
47 |
This is a sort of Java porting of the Python exploit at: https://www.exploit-db.com/exploits/41570/. |
https://github.com/m3ssap0/struts2_cve-2017-5638 |
POC详情
|
48 |
Golang exploit for CVE-2017-5638 |
https://github.com/Greynad/struts2-jakarta-inject |
POC详情
|
49 |
Apache Struts CVE-2017-5638 RCE exploitation |
https://github.com/ggolawski/struts-rce |
POC详情
|
50 |
Apache Struts 2.3.5 < 2.3.31 / 2.5 < 2.5.10 - Remote Code Execution - Shell Script |
https://github.com/win3zz/CVE-2017-5638 |
POC详情
|
51 |
None |
https://github.com/leandrocamposcardoso/CVE-2017-5638-Mass-Exploit |
POC详情
|
52 |
Exploitable target to CVE-2017-5638 |
https://github.com/Iletee/struts2-rce |
POC详情
|
53 |
Apache Struts version analyzer (Ansible) based on CVE-2017-5638 |
https://github.com/andypitcher/check_struts |
POC详情
|
54 |
None |
https://github.com/un4ckn0wl3z/CVE-2017-5638 |
POC详情
|
55 |
CVE-2017-5638 (PoC Exploits) |
https://github.com/colorblindpentester/CVE-2017-5638 |
POC详情
|
56 |
Demo app of THAT data broker's security breach |
https://github.com/injcristianrojas/cve-2017-5638 |
POC详情
|
57 |
(CVE-2017-5638) XworkStruts RCE Vuln test script |
https://github.com/ludy-dev/XworkStruts-RCE |
POC详情
|
58 |
Exploitable target to CVE-2017-5638 |
https://github.com/sonatype-workshops/struts2-rce |
POC详情
|
59 |
PoC for CVE: 2017-5638 - Apache Struts2 S2-045 |
https://github.com/jongmartinez/CVE-2017-5638 |
POC详情
|
60 |
None |
https://github.com/Badbird3/CVE-2017-5638 |
POC详情
|
61 |
An implementation of CVE-2017-5638 |
https://github.com/jptr218/struts_hack |
POC详情
|
62 |
Build the struts-2.3.31 (CVE-2017-5638) environment |
https://github.com/testpilot031/vulnerability_struts-2.3.31 |
POC详情
|
63 |
This script is intended to validate Apache Struts 2 vulnerability (CVE-2017-5638), AKA Struts-Shock. |
https://github.com/readloud/CVE-2017-5638 |
POC详情
|
64 |
None |
https://github.com/Tankirat/CVE-2017-5638 |
POC详情
|
65 |
None |
https://github.com/0xConstant/CVE-2017-5638 |
POC详情
|
66 |
this exemple of application permet to test the vunerability CVE_2017-5638 |
https://github.com/mfdev-solution/Exploit-CVE-2017-5638 |
POC详情
|
67 |
An exploit for CVE-2017-5638 |
https://github.com/mritunjay-k/CVE-2017-5638 |
POC详情
|
68 |
A exploit for CVE-2017-5638. This exploit works on versions 2.3.5-2.3.31 and 2.5 – 2.5.10 |
https://github.com/FredBrave/CVE-2017-5638-ApacheStruts2.3.5 |
POC详情
|
69 |
This is the Apache Struts CVE-2017-5638 struts 2 vulnerability. The same CVE that resulted in the equifax database breach. |
https://github.com/donaldashdown/Common-Vulnerability-and-Exploit |
POC详情
|
70 |
This project demonstrates a Web Application Firewall (WAF) simulation using Flask and a vulnerability checker for CVE-2017-5638. The WAF middleware blocks HTTP requests containing specific patterns, and the vulnerability checker tests for and exploits the Apache Struts 2 vulnerability (CVE-2017-5638). |
https://github.com/Nithylesh/web-application-firewall- |
POC详情
|
71 |
This repository provides a PoC for CVE-2017-5638, a remote code execution vulnerability in Apache Struts 2, exploitable via a crafted Content-Type HTTP header. |
https://github.com/kloutkake/CVE-2017-5638-PoC |
POC详情
|
72 |
Struts2 Application Vulnerable to CVE-2017-5638. Explains how the exploit of the vulnerability works in relation to OGNL and the JakartaMultiPart parser. |
https://github.com/sighup1/cybersecurity-struts2 |
POC详情
|
73 |
Proof of concept of CVE-2017-5638 including the whole setup of the Apache vulnerable server |
https://github.com/Xernary/CVE-2017-5638-POC |
POC详情
|
74 |
None |
https://github.com/banomaly/CVE-2017-5638 |
POC详情
|
75 |
Apache Struts 2.3.x before 2.3.32 and 2.5.x before 2.5.10.1 is susceptible to remote command injection attacks. The Jakarta Multipart parser has incorrect exception handling and error-message generation during file upload attempts, which can allow an attacker to execute arbitrary commands via a crafted Content-Type, Content-Disposition, or Content-Length HTTP header. This was exploited in March 2017 with a Content-Type header containing a #cmd= string.
|
https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2017/CVE-2017-5638.yaml |
POC详情
|
76 |
None |
https://github.com/Threekiii/Awesome-POC/blob/master/%E4%B8%AD%E9%97%B4%E4%BB%B6%E6%BC%8F%E6%B4%9E/Apache%20Struts2%20S2-046%20%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2017-5638.md |
POC详情
|
77 |
None |
https://github.com/Threekiii/Awesome-POC/blob/master/%E4%B8%AD%E9%97%B4%E4%BB%B6%E6%BC%8F%E6%B4%9E/Apache%20Struts2%20S2-045%20%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2017-5638.md |
POC详情
|