Apache Struts 2 prior to 22.214.171.124 allows remote malicious users to execute arbitrary OGNL code via a crafted request that is not properly handled when using the includeParams attribute in the (1) URL or (2) A tag. NOTE: this issue is due to an incomplete fix for CVE-2013-1966.
This module exploits a remote command execution vulnerability in Apache Struts versions < 126.96.36.199. A specifically crafted request parameter can be used to inject arbitrary OGNL code into the stack bypassing Struts and OGNL library protections. When targeting an action which requires interaction through GET, the payload should be split, taking into account the URI limits. In this case, if the rendered JSP has more than one point of injection, it could result in payload corruption. This should happen only when the payload is larger than the URI length.
msf > use exploit/multi/http/struts_include_params msf exploit(struts_include_params) > show targets ...targets... msf exploit(struts_include_params) > set TARGET <target-id> msf exploit(struts_include_params) > show options ...show and set options... msf exploit(struts_include_params) > exploit
Generates Deep Security CSV reports
Setup Instructions Download & install the Deep Security SDK Create Deep Security API keys Set the API key as a DS_KEY environment variable Usage Instructions Help Menu $ python3 reporterpy -h usage: reporterpy [-h] [--report-filename REPORT_FILENAME] [--summary-filename SUMMARY_FILENAME] [--app-names [APP_NAMES [APP_NAMES