支持本站 — 捐款将帮助我们持续运营

目标:1000 元,已筹:752

75.2%
一、 漏洞 CVE-2017-5638 基础信息
漏洞信息
                                        # N/A

## 漏洞概述
Jakarta Multipart parser在处理文件上传时存在异常处理和错误消息生成的缺陷,允许远程攻击者通过精心设计的HTTP头(如Content-Type, Content-Disposition, 或 Content-Length)执行任意命令。

## 影响版本
- Apache Struts 2 2.3.x 版本低于2.3.32
- Apache Struts 2 2.5.x 版本低于2.5.10.1

## 细节
在文件上传过程中,受影响版本的Jakarta Multipart parser未能正确处理异常,导致错误消息生成存在问题。攻击者可以通过构造特定的HTTP头(特别是包含#cmd=字符串的Content-Type头),利用此缺陷执行任意命令。

## 影响
此漏洞曾于2017年3月被利用于野,在实际攻击中,攻击者通过精心设计的Content-Type头携带恶意指令成功执行了任意命令。
                                        
神龙判断

是否为 Web 类漏洞:

判断理由:

是。这个漏洞存在于Apache Struts 2的Jakarta Multipart解析器中,影响了其处理文件上传时的异常处理和错误消息生成。远程攻击者可以通过精心构造的Content-Type、Content-Disposition或Content-Length HTTP头来执行任意命令,例如利用Content-Type头中包含的#cmd=字符串。这表明该漏洞是Web服务端的漏洞,因为它涉及到服务端对HTTP请求头的处理。
提示
尽管我们采用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。
神龙会尽力确保数据准确,但也请结合实际情况进行甄别与判断。
神龙祝您一切顺利!
漏洞标题
N/A
来源:美国国家漏洞数据库 NVD
漏洞描述信息
The Jakarta Multipart parser in Apache Struts 2 2.3.x before 2.3.32 and 2.5.x before 2.5.10.1 has incorrect exception handling and error-message generation during file-upload attempts, which allows remote attackers to execute arbitrary commands via a crafted Content-Type, Content-Disposition, or Content-Length HTTP header, as exploited in the wild in March 2017 with a Content-Type header containing a #cmd= string.
来源:美国国家漏洞数据库 NVD
CVSS信息
N/A
来源:美国国家漏洞数据库 NVD
漏洞类别
N/A
来源:美国国家漏洞数据库 NVD
漏洞标题
Apache Struts 2 输入验证错误漏洞
来源:中国国家信息安全漏洞库 CNNVD
漏洞描述信息
Apache Struts是美国阿帕奇(Apache)软件基金会的一个开源项目,是一套用于创建企业级Java Web应用的开源MVC框架,主要提供两个版本框架产品,Struts 1和Struts 2。 Apache Struts 2 2.3.32之前的2 2.3.x版本和2.5.10.1之前的2.5.x版本中的Jakarta Multipart解析器存在安全漏洞,该漏洞源于程序没有正确处理文件上传。远程攻击者可借助带有#cmd=字符串的特制Content-Type HTTP头利用该漏洞执行任意命令。
来源:中国国家信息安全漏洞库 CNNVD
CVSS信息
N/A
来源:中国国家信息安全漏洞库 CNNVD
漏洞类别
输入验证错误
来源:中国国家信息安全漏洞库 CNNVD
二、漏洞 CVE-2017-5638 的公开POC
#POC 描述源链接神龙链接
1Struts2 S2-045(CVE-2017-5638)Vulnerability environment - http://www.mottoin.com/97954.htmlhttps://github.com/PolarisLab/S2-045POC详情
2Struts2 S2-045(CVE-2017-5638)Exp with GUIhttps://github.com/Flyteas/Struts2-045-ExpPOC详情
3Nonehttps://github.com/bongbongco/cve-2017-5638POC详情
4S2-045 漏洞 POC-TOOLS CVE-2017-5638https://github.com/jas502n/S2-045-EXP-POC-TOOLSPOC详情
5Telegram Bot to manage botnets created with struts vulnerability(CVE-2017-5638)https://github.com/mthbernardes/strutszeiroPOC详情
6Example PoC Code for CVE-2017-5638 | Apache Struts Exploit https://github.com/xsscx/cve-2017-5638POC详情
7Demo Application and Exploithttps://github.com/immunio/apache-struts2-CVE-2017-5638POC详情
8This is Valve for Tomcat7 to block Struts 2 Remote Code Execution vulnerability (CVE-2017-5638)https://github.com/Masahiro-Yamada/OgnlContentTypeRejectorValvePOC详情
9Tweaking original PoC (https://github.com/rapid7/metasploit-framework/issues/8064) to work on self-signed certificates https://github.com/aljazceru/CVE-2017-5638-Apache-Struts2POC详情
10test struts2 vulnerability CVE-2017-5638 in Mac OS Xhttps://github.com/sjitech/test_struts2_vulnerability_CVE-2017-5638POC详情
11Nonehttps://github.com/jrrombaldo/CVE-2017-5638POC详情
12CVE: 2017-5638 in different formatshttps://github.com/random-robbie/CVE-2017-5638POC详情
13detection for Apache Struts recon and compromise https://github.com/initconf/CVE-2017-5638_strutsPOC详情
14An exploit for Apache Struts CVE-2017-5638https://github.com/mazen160/struts-pwnPOC详情
15These are just some script which you can use to detect and exploit the Apache Struts Vulnerability (CVE-2017-5638)https://github.com/ret2jazzy/Struts-Apache-ExploitPackPOC详情
16A php based exploiter for CVE-2017-5638.https://github.com/lolwaleet/ExpStrutsPOC详情
17Example PHP Exploiter for CVE-2017-5638https://github.com/oktavianto/CVE-2017-5638-Apache-Struts2POC详情
18cve-2017-5638 Vulnerable site samplehttps://github.com/jrrdev/cve-2017-5638POC详情
19Struts2 RCE CVE-2017-5638 non-intrusive check shell scripthttps://github.com/opt9/StrutshockPOC详情
20Apache Struts (CVE-2017-5638) Shellhttps://github.com/falcon-lnhg/StrutsShellPOC详情
21Nonehttps://github.com/bhagdave/CVE-2017-5638POC详情
22st2-046-poc CVE-2017-5638https://github.com/jas502n/st2-046-pocPOC详情
23S2-046|S2-045: Struts 2 Remote Code Execution vulnerability(CVE-2017-5638)https://github.com/KarzsGHR/S2-046_S2-045_POCPOC详情
24CVE-2017-5638https://github.com/gsfish/S2-ReaperPOC详情
25Nonehttps://github.com/mcassano/cve-2017-5638POC详情
26Struts2 RCE CVE-2017-5638 CLI shellhttps://github.com/opt9/StrutscliPOC详情
27Strutsy - Mass exploitation of Apache Struts (CVE-2017-5638) vulnerabilityhttps://github.com/tahmed11/strutsyPOC详情
28Apache Struts 2.0 RCE vulnerability - Allows an attacker to inject OS commands into a web application through the content-type header https://github.com/payatu/CVE-2017-5638POC详情
29CVE-2017-5638https://github.com/Aasron/Struts2-045-ExpPOC详情
30An exploit for CVE-2017-5638 Remote Code Execution (RCE) Vulnerability in Apache Struts 2https://github.com/SpiderMate/StutsfiPOC详情
31An exploit (and library) for CVE-2017-5638 - Apache Struts2 S2-045 bug.https://github.com/jpacora/Struts2ShellPOC详情
32Nonehttps://github.com/AndreasKl/CVE-2017-5638POC详情
33Struts-RCE CVE-2017-5638https://github.com/riyazwalikar/struts-rce-cve-2017-5638POC详情
34Nonehttps://github.com/homjxi0e/CVE-2017-5638POC详情
35CVE-2017-5638 Test environmenthttps://github.com/eeehit/CVE-2017-5638POC详情
36Nonehttps://github.com/sUbc0ol/Apache-Struts-CVE-2017-5638-RCE-Mass-ScannerPOC详情
37Nonehttps://github.com/sUbc0ol/Apache-Struts2-RCE-Exploit-v2-CVE-2017-5638POC详情
38Exploit created by: R4v3nBl4ck end Pacmanhttps://github.com/R4v3nBl4ck/Apache-Struts-2-CVE-2017-5638-Exploit-POC详情
39Nonehttps://github.com/Xhendos/CVE-2017-5638POC详情
40Nonehttps://github.com/TamiiLambrado/Apache-Struts-CVE-2017-5638-RCE-Mass-ScannerPOC详情
41Check for Struts Vulnerability CVE-2017-5638https://github.com/invisiblethreat/strutserPOC详情
42Nonehttps://github.com/lizhi16/CVE-2017-5638POC详情
43 An exploit for Apache Struts CVE-2017-5638https://github.com/c002/Apache-StrutsPOC详情
44Struts2 Application Vulnerable to CVE-2017-5638. Explains how the exploit of the vulnerability works in relation to OGNL and the JakartaMultiPart parser.https://github.com/pr0x1ma-byte/cybersecurity-struts2POC详情
45Working POC for CVE 2017-5638https://github.com/cafnet/apache-struts-v2-CVE-2017-5638POC详情
46Struts02 s2-045 exploit programhttps://github.com/0x00-0x00/CVE-2017-5638POC详情
47This is a sort of Java porting of the Python exploit at: https://www.exploit-db.com/exploits/41570/.https://github.com/m3ssap0/struts2_cve-2017-5638POC详情
48Golang exploit for CVE-2017-5638https://github.com/Greynad/struts2-jakarta-injectPOC详情
49Apache Struts CVE-2017-5638 RCE exploitationhttps://github.com/ggolawski/struts-rcePOC详情
50Apache Struts 2.3.5 < 2.3.31 / 2.5 < 2.5.10 - Remote Code Execution - Shell Scripthttps://github.com/win3zz/CVE-2017-5638POC详情
51Nonehttps://github.com/leandrocamposcardoso/CVE-2017-5638-Mass-ExploitPOC详情
52Exploitable target to CVE-2017-5638https://github.com/Iletee/struts2-rcePOC详情
53Apache Struts version analyzer (Ansible) based on CVE-2017-5638https://github.com/andypitcher/check_strutsPOC详情
54Nonehttps://github.com/un4ckn0wl3z/CVE-2017-5638POC详情
55CVE-2017-5638 (PoC Exploits)https://github.com/colorblindpentester/CVE-2017-5638POC详情
56Demo app of THAT data broker's security breachhttps://github.com/injcristianrojas/cve-2017-5638POC详情
57(CVE-2017-5638) XworkStruts RCE Vuln test scripthttps://github.com/ludy-dev/XworkStruts-RCEPOC详情
58Exploitable target to CVE-2017-5638https://github.com/sonatype-workshops/struts2-rcePOC详情
59PoC for CVE: 2017-5638 - Apache Struts2 S2-045https://github.com/jongmartinez/CVE-2017-5638POC详情
60Nonehttps://github.com/Badbird3/CVE-2017-5638POC详情
61An implementation of CVE-2017-5638https://github.com/jptr218/struts_hackPOC详情
62Build the struts-2.3.31 (CVE-2017-5638) environmenthttps://github.com/testpilot031/vulnerability_struts-2.3.31POC详情
63This script is intended to validate Apache Struts 2 vulnerability (CVE-2017-5638), AKA Struts-Shock.https://github.com/readloud/CVE-2017-5638POC详情
64Nonehttps://github.com/Tankirat/CVE-2017-5638POC详情
65Nonehttps://github.com/0xConstant/CVE-2017-5638POC详情
66this exemple of application permet to test the vunerability CVE_2017-5638https://github.com/mfdev-solution/Exploit-CVE-2017-5638POC详情
67An exploit for CVE-2017-5638https://github.com/mritunjay-k/CVE-2017-5638POC详情
68A exploit for CVE-2017-5638. This exploit works on versions 2.3.5-2.3.31 and 2.5 – 2.5.10https://github.com/FredBrave/CVE-2017-5638-ApacheStruts2.3.5POC详情
69This is the Apache Struts CVE-2017-5638 struts 2 vulnerability. The same CVE that resulted in the equifax database breach.https://github.com/donaldashdown/Common-Vulnerability-and-ExploitPOC详情
70This project demonstrates a Web Application Firewall (WAF) simulation using Flask and a vulnerability checker for CVE-2017-5638. The WAF middleware blocks HTTP requests containing specific patterns, and the vulnerability checker tests for and exploits the Apache Struts 2 vulnerability (CVE-2017-5638).https://github.com/Nithylesh/web-application-firewall-POC详情
71This repository provides a PoC for CVE-2017-5638, a remote code execution vulnerability in Apache Struts 2, exploitable via a crafted Content-Type HTTP header.https://github.com/kloutkake/CVE-2017-5638-PoCPOC详情
72Struts2 Application Vulnerable to CVE-2017-5638. Explains how the exploit of the vulnerability works in relation to OGNL and the JakartaMultiPart parser.https://github.com/sighup1/cybersecurity-struts2POC详情
73Proof of concept of CVE-2017-5638 including the whole setup of the Apache vulnerable serverhttps://github.com/Xernary/CVE-2017-5638-POCPOC详情
74Nonehttps://github.com/banomaly/CVE-2017-5638POC详情
75Apache Struts 2.3.x before 2.3.32 and 2.5.x before 2.5.10.1 is susceptible to remote command injection attacks. The Jakarta Multipart parser has incorrect exception handling and error-message generation during file upload attempts, which can allow an attacker to execute arbitrary commands via a crafted Content-Type, Content-Disposition, or Content-Length HTTP header. This was exploited in March 2017 with a Content-Type header containing a #cmd= string. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2017/CVE-2017-5638.yamlPOC详情
76Nonehttps://github.com/Threekiii/Awesome-POC/blob/master/%E4%B8%AD%E9%97%B4%E4%BB%B6%E6%BC%8F%E6%B4%9E/Apache%20Struts2%20S2-046%20%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2017-5638.mdPOC详情
77Nonehttps://github.com/Threekiii/Awesome-POC/blob/master/%E4%B8%AD%E9%97%B4%E4%BB%B6%E6%BC%8F%E6%B4%9E/Apache%20Struts2%20S2-045%20%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2017-5638.mdPOC详情
78Nonehttps://github.com/toothbrushsoapflannelbiscuits/cve-2017-5638POC详情
79CVE-2017-5638 Exploit Rewritten In Python By haxerr9https://github.com/haxerr9/CVE-2017-5638POC详情
80Nonehttps://github.com/QHxDr-dz/CVE-2017-5638POC详情
81Real-time anomaly detection system for Apache Struts CVE-2017-5638 exploit using streaming analytics, 3-gram byte analysis, and Count-Min Sketch. Detects RCE attacks without signatures, with <5ms latency and <0.1% false positives. https://github.com/joidiego/Detection-struts-cve-2017-5638-detectorPOC详情
82Apache Struts2 CVE-2017-5638 (Safe Educational Demo)https://github.com/iampetru/PoC-CVE-2017-5638POC详情
83Nonehttps://github.com/MuhammadAbdullah192/CVE-2017-5638-Remote-Code-Execution-Apache-Struts2-EXPLOITATIONPOC详情
84A hands-on simulation of CVE-2017-5638 (Apache Struts2 RCE), showcasing exploit reproduction, OS-level command execution, and mitigations such as input sanitization and endpoint monitoring. Built in Python/Flask with Jupyter notebook demoshttps://github.com/kaylertee/Computer-Security-Equifax-2017POC详情
85CVE-2017-5638- PoC https://github.com/FozilCV/Apache-Struts2-CVE-2017-5638POC详情
86Telegram Bot to manage botnets created with struts vulnerability(CVE-2017-5638)https://github.com/btamburi/strutszeiroPOC详情
87A Deliberately Vulnerable Web Application built on Struts 2 (CVE-2017-5638) and Log4J (CVE-2021-44228) for testing and demonstration of OWASP Top 10 Web Application Security Risks: A06:2021-Vulnerable and Outdated Components.https://github.com/timothyjxhn/DeliberatelyVulnerableWebAppPOC详情
88Nonehttps://github.com/ACharaf06/CVE-2017-5638-Attack-and-DefensePOC详情
89Nonehttps://github.com/smancke/CVE-2017-5638POC详情
90Software Security & Privacy ~ Assignement 3 : CVE PoChttps://github.com/louislafosse/CVE-2017-5638-assignementPOC详情
三、漏洞 CVE-2017-5638 的情报信息
四、漏洞 CVE-2017-5638 的评论

暂无评论


发表评论