# N/A
## 漏洞概述
Apache Struts 2 中的 REST 插件在处理 XML 数据时使用了 XStreamHandler,但由于没有进行类型过滤,导致在反序列化 XML 数据时存在远程代码执行漏洞。
## 影响版本
- Apache Struts 2.1.1 至 2.3.x 版本(低于 2.3.34)
- Apache Struts 2.5.x 版本(低于 2.5.13)
## 漏洞细节
REST 插件使用了 XStreamHandler 进行 XML 数据的反序列化。由于 XStream 实例在反序列化过程中没有启用类型过滤,攻击者可以通过构造特定的 XML 数据包触发远程代码执行。
## 影响
此漏洞可能导致远程代码执行,攻击者可以利用此漏洞在受影响的服务器上执行任意代码,从而控制服务器或进一步发起攻击。
# | POC 描述 | 源链接 | 神龙链接 |
---|---|---|---|
1 | CVE 2017-9805 | https://github.com/luc10/struts-rce-cve-2017-9805 | POC详情 |
2 | cve -2017-9805 | https://github.com/hahwul/struts2-rce-cve-2017-9805-ruby | POC详情 |
3 | An exploit for Apache Struts CVE-2017-9805 | https://github.com/mazen160/struts-pwn_CVE-2017-9805 | POC详情 |
4 | An exploit for Apache Struts CVE-2017-9805 | https://github.com/Lone-Ranger/apache-struts-pwn_CVE-2017-9805 | POC详情 |
5 | Exploit script for Apache Struts2 REST Plugin XStream RCE (CVE-2017-9805) | https://github.com/0x00-0x00/-CVE-2017-9805 | POC详情 |
6 | CVE-2017-9805 - Exploit | https://github.com/BeyondCy/S2-052 | POC详情 |
7 | Better Exploit Code For CVE 2017 9805 apache struts | https://github.com/chrisjd20/cve-2017-9805.py | POC详情 |
8 | Simple python script to fuzz site for CVE-2017-9805 | https://github.com/UbuntuStrike/struts_rest_rce_fuzz-CVE-2017-9805- | POC详情 |
9 | A script to Fuzz and and exploit Apache struts CVE-2017-9805 | https://github.com/UbuntuStrike/CVE-2017-9805-Apache-Struts-Fuzz-N-Sploit | POC详情 |
10 | None | https://github.com/AvishkaSenadheera/CVE-2017-9805---Documentation---IT19143378 | POC详情 |
11 | Struts 2.5 - 2.5.12 REST Plugin XStream RCE | https://github.com/wifido/CVE-2017-9805-Exploit | POC详情 |
12 | None | https://github.com/rvermeulen/apache-struts-cve-2017-9805 | POC详情 |
13 | Exploit script for Apache Struts2 REST Plugin XStream RCE (CVE-2017-9805) | https://github.com/jongmartinez/-CVE-2017-9805- | POC详情 |
14 | struts2-rest-showcase 2.5.10 | https://github.com/z3bd/CVE-2017-9805 | POC详情 |
15 | CVE-2017-9805-Exploit | https://github.com/0xd3vil/CVE-2017-9805-Exploit | POC详情 |
16 | CVE-2017-9805 POC | https://github.com/Shakun8/CVE-2017-9805 | POC详情 |
17 | The REST Plugin in Apache Struts 2.1.1 through 2.3.x before 2.3.34 and 2.5.x before 2.5.13 uses an XStreamHandler with an instance of XStream for deserialization without any type of filtering, which can lead to remote code execution when deserializing XML payloads. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2017/CVE-2017-9805.yaml | POC详情 |
18 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E4%B8%AD%E9%97%B4%E4%BB%B6%E6%BC%8F%E6%B4%9E/Apache%20Struts2%20S2-052%20%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2017-9805.md | POC详情 |