# N/A
## 漏洞概述
Apache Struts 2 中的 REST 插件在处理 XML 数据时使用了 XStreamHandler,但由于没有进行类型过滤,导致在反序列化 XML 数据时存在远程代码执行漏洞。
## 影响版本
- Apache Struts 2.1.1 至 2.3.x 版本(低于 2.3.34)
- Apache Struts 2.5.x 版本(低于 2.5.13)
## 漏洞细节
REST 插件使用了 XStreamHandler 进行 XML 数据的反序列化。由于 XStream 实例在反序列化过程中没有启用类型过滤,攻击者可以通过构造特定的 XML 数据包触发远程代码执行。
## 影响
此漏洞可能导致远程代码执行,攻击者可以利用此漏洞在受影响的服务器上执行任意代码,从而控制服务器或进一步发起攻击。
是否为 Web 类漏洞: 是
判断理由:
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | CVE 2017-9805 | https://github.com/luc10/struts-rce-cve-2017-9805 | POC详情 |
| 2 | cve -2017-9805 | https://github.com/hahwul/struts2-rce-cve-2017-9805-ruby | POC详情 |
| 3 | An exploit for Apache Struts CVE-2017-9805 | https://github.com/mazen160/struts-pwn_CVE-2017-9805 | POC详情 |
| 4 | An exploit for Apache Struts CVE-2017-9805 | https://github.com/Lone-Ranger/apache-struts-pwn_CVE-2017-9805 | POC详情 |
| 5 | Exploit script for Apache Struts2 REST Plugin XStream RCE (CVE-2017-9805) | https://github.com/0x00-0x00/-CVE-2017-9805 | POC详情 |
| 6 | CVE-2017-9805 - Exploit | https://github.com/BeyondCy/S2-052 | POC详情 |
| 7 | Better Exploit Code For CVE 2017 9805 apache struts | https://github.com/chrisjd20/cve-2017-9805.py | POC详情 |
| 8 | Simple python script to fuzz site for CVE-2017-9805 | https://github.com/UbuntuStrike/struts_rest_rce_fuzz-CVE-2017-9805- | POC详情 |
| 9 | A script to Fuzz and and exploit Apache struts CVE-2017-9805 | https://github.com/UbuntuStrike/CVE-2017-9805-Apache-Struts-Fuzz-N-Sploit | POC详情 |
| 10 | None | https://github.com/AvishkaSenadheera/CVE-2017-9805---Documentation---IT19143378 | POC详情 |
| 11 | Struts 2.5 - 2.5.12 REST Plugin XStream RCE | https://github.com/wifido/CVE-2017-9805-Exploit | POC详情 |
| 12 | None | https://github.com/rvermeulen/apache-struts-cve-2017-9805 | POC详情 |
| 13 | Exploit script for Apache Struts2 REST Plugin XStream RCE (CVE-2017-9805) | https://github.com/jongmartinez/-CVE-2017-9805- | POC详情 |
| 14 | struts2-rest-showcase 2.5.10 | https://github.com/z3bd/CVE-2017-9805 | POC详情 |
| 15 | CVE-2017-9805-Exploit | https://github.com/0xd3vil/CVE-2017-9805-Exploit | POC详情 |
| 16 | CVE-2017-9805 POC | https://github.com/Shakun8/CVE-2017-9805 | POC详情 |
| 17 | The REST Plugin in Apache Struts 2.1.1 through 2.3.x before 2.3.34 and 2.5.x before 2.5.13 uses an XStreamHandler with an instance of XStream for deserialization without any type of filtering, which can lead to remote code execution when deserializing XML payloads. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2017/CVE-2017-9805.yaml | POC详情 |
| 18 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E4%B8%AD%E9%97%B4%E4%BB%B6%E6%BC%8F%E6%B4%9E/Apache%20Struts2%20S2-052%20%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2017-9805.md | POC详情 |
| 19 | Example web application that run on struts2 REST plugin 2.5.8, for demonstration purpose only | https://github.com/NoSpaceAvailable/CVE-2017-9805_example_build | POC详情 |
标题: 1488482 – (CVE-2017-9805) CVE-2017-9805 struts: RCE attack via REST plugin with XStream handler to deserialise XML requests -- 🔗来源链接
标签:x_refsource_CONFIRM
神龙速读:
## 关键漏洞信息
- **CVE标识**: CVE-2017-9805
- **漏洞类型**: RCE (Remote Code Execution)
- **受影响的插件**: REST plugin
- **风险因素**: XStream handler used for deserialization without type filtering
- **受影响的版本**: Struts 2.5 - Struts 2.5.12
- **修复版本**: Struts 2.5.13
- **外部参考**: https://struts.apache.org/docs/s2-052.html
## 处置建议
- 查找并移除受影响的`struts2-core.jar`文件。
- 有风险的产品包括:Fuse Service Works 6.0.0、Single Sign On 7.3.0+
暂无评论