10
CVSSv2

CVE-2017-5638

Published: 11/03/2017 Updated: 07/11/2023
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
CVSS v3 Base Score: 10 | Impact Score: 6 | Exploitability Score: 3.9
VMScore: 1000
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

The Jakarta Multipart parser in Apache Struts 2 2.3.x prior to 2.3.32 and 2.5.x prior to 2.5.10.1 has incorrect exception handling and error-message generation during file-upload attempts, which allows remote malicious users to execute arbitrary commands via a crafted Content-Type, Content-Disposition, or Content-Length HTTP header, as exploited in the wild in March 2017 with a Content-Type header containing a #cmd= string.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apache struts 2.3.5

apache struts 2.3.28

apache struts 2.3.20.2

apache struts 2.3.15

apache struts 2.3.25

apache struts 2.3.14

apache struts 2.3.13

apache struts 2.3.16

apache struts 2.3.24.2

apache struts 2.3.17

apache struts 2.3.24.1

apache struts 2.3.22

apache struts 2.3.9

apache struts 2.3.16.3

apache struts 2.3.23

apache struts 2.3.6

apache struts 2.3.24.3

apache struts 2.3.15.2

apache struts 2.3.29

apache struts 2.3.14.3

apache struts 2.3.19

apache struts 2.3.20.1

apache struts 2.3.8

apache struts 2.3.30

apache struts 2.3.7

apache struts 2.3.24

apache struts 2.3.28.1

apache struts 2.3.14.2

apache struts 2.3.20.3

apache struts 2.3.10

apache struts 2.3.15.1

apache struts 2.3.16.2

apache struts 2.3.26

apache struts 2.3.12

apache struts 2.3.27

apache struts 2.3.31

apache struts 2.3.21

apache struts 2.3.20

apache struts 2.3.11

apache struts 2.3.15.3

apache struts 2.3.16.1

apache struts 2.3.14.1

apache struts 2.5.9

apache struts 2.5.2

apache struts 2.5.10

apache struts 2.5.6

apache struts 2.5.1

apache struts 2.5.4

apache struts 2.5.7

apache struts 2.5

apache struts 2.5.5

apache struts 2.5.3

apache struts 2.5.8

Vendor Advisories

A flaw was reported in Apache Struts 2 that could allow an attacker to perform remote code execution with a malicious Content-Type value ...
On March 6, 2017, Apache disclosed a vulnerability in the Jakarta Multipart parser used in Apache Struts2 that could allow an attacker to execute commands remotely on a targeted system by using a crafted Content-Type, Content-Disposition, or Content-Length value This vulnerability has been assigned CVE-ID CVE-2017-5638 This advisory is availabl ...

Exploits

Apache Struts 2 versions 23x before 2332 and 25x before 25101 remote code execution exploit that provides a reverse shell ...
#!/usr/bin/python # -*- coding: utf-8 -*- import urllib2 import httplib def exploit(url, cmd): payload = "%{(#_='multipart/form-data')" payload += "(#dm=@ognlOgnlContext@DEFAULT_MEMBER_ACCESS)" payload += "(#_memberAccess?" payload += "(#_memberAccess=#dm):" payload += "((#container=#context['comopensymphonyxwork2Action ...
## # This module requires Metasploit: metasploitcom/download # Current source: githubcom/rapid7/metasploit-framework ## require 'msf/core' class MetasploitModule < Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpClient include Msf::Exploit::EXE def initialize(info = {}) super(update ...

Nmap Scripts

http-vuln-cve2017-5638

Detects whether the specified URL is vulnerable to the Apache Struts Remote Code Execution Vulnerability (CVE-2017-5638).

nmap -p <port> --script http-vuln-cve2017-5638 <target>

PORT STATE SERVICE 80/tcp open http | http-vuln-cve2017-5638: | VULNERABLE | Apache Struts Remote Code Execution Vulnerability | State: VULNERABLE | IDs: CVE:CVE-2017-5638 | | Disclosure date: 2017-03-07 | References: | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5638 | https://cwiki.apache.org/confluence/display/WW/S2-045 |_ http://blog.talosintelligence.com/2017/03/apache-0-day-exploited.html
http-vuln-cve2017-5638

Detects whether the specified URL is vulnerable to the Apache Struts Remote Code Execution Vulnerability (CVE-2017-5638).

nmap -p <port> --script http-vuln-cve2017-5638 <target>

PORT STATE SERVICE 80/tcp open http | http-vuln-cve2017-5638: | VULNERABLE | Apache Struts Remote Code Execution Vulnerability | State: VULNERABLE | IDs: CVE:CVE-2017-5638 | | Disclosure date: 2017-03-07 | References: | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5638 | https://cwiki.apache.org/confluence/display/WW/S2-045 |_ http://blog.talosintelligence.com/2017/03/apache-0-day-exploited.html

Github Repositories

Leadership-Briefing-Post-Incident Cybersecuity leadership brieifings help bring awareness and exposure to new incidents This project is an example of a post-incident leadership briefing as a cybersecurity manager The leadership briefing oulines the findings of the Apache Struts vunerability dubbed CVE 2017-5638 The leadership briefing on the Apache Struts vulnerability, CVE

JexBoss - JBoss (and others Java Deserialization Vulnerabilities) verify and EXploitation Tool JexBoss is a tool for testing and exploiting vulnerabilities in JBoss Application Server and others Java Platforms, Frameworks, Applications, etc Requirements Python &gt;= 27x urllib3 ipaddress Installation on Linux\Mac To install the latest version of JexBoss, please use the

JexBoss - JBoss (and others Java Deserialization Vulnerabilities) verify and EXploitation Tool JexBoss is a tool for testing and exploiting vulnerabilities in JBoss Application Server and others Java Platforms, Frameworks, Applications, etc Requirements Python &gt;= 27x urllib3 ipaddress Installation on Linux\Mac To install the latest version of JexBoss, please use the

This is a sample project to demonstrate the Equifax struts vulnerability and how SELinux can help First of all, Please Dont Disable SELinux! Disabling SELinux seems to be the easiest thing to do when things don't work After disabling SELinux, things begin to work However, by doing so, we lose a very powerful security tool This simple repository will demonstrate the us

A tool to slice URLs

SlicePathsURL Usage • Installation • Why use SlicePathsURL? • How does SlicePathsURL work? SlicePathsURL slices a URL into directory levels to complement tools like Nuclei in searching for vulnerabilities in directories beyond the root of the URL - Installation &amp; Requirements: go install githubcom/erickfernandox/slicepathsurl@latest

CVE-2017-5638 and CVE-2017-9793 S2-045-and-S2-052-Struts-2-in-1 Author: (m4ud) Struts pwning tool! Options: -h, --help show this help message and exit -p RPORT, --rport=RPORT RPORT, -t TARGET, --target=TARGET Vulnerable Target, -d DIRECTORY, --dir=DIRECTORY Struts Application directory,

Demo Application and Exploit

apache-struts2-CVE-2017-5638 Demo Application and Exploit Sample Apache Struts2 App Struts2-showcase: mvnrepositorycom/artifact/orgapachestruts/struts2-showcase/2312 Exploit Reference: rapid7/metasploit-framework#8064

Exploit created by: R4v3nBl4ck end Pacman

Apache-Struts-2-CVE-2017-5638-Exploit This exploit exploits the Apache Struts2 vulnerability (CVE-2017-5638), allowing us to execute commands remotely on the apache server How to use: $ sudo python Struts2_Shell001py ******************************************* * [!] Exploit Apache Struts2 {*}DEMO * *******************************************

Welcome to the F5 Advanced Web Application Firewall lab guide This series of lab exercises is intended to explain and demonstrate some key features of F5 Advanced Web Application Firewall The intend is to provide demos on the following content: Original Lab Guide Table of Contents Getting to Know the Environment Module 1: Lab Topology Class 1 - Getting started with WAF, Bot

First principles write up of the JAuth Challenge on PicoCTF

Write up of JAuth PicoCTF problem This write up of the PicoCTF JAuth challenge is different from others because it is from first-principles We explain how the clues lead logically to the solution! Problem Specification AUTHOR: GEOFFREY NJOGU Most web application developers use third party components without testing their security Some of the past affected companies are: Eq

Apache Struts 2.3.5 < 2.3.31 / 2.5 < 2.5.10 - Remote Code Execution - Shell Script

CVE-2017-5638 Apache Struts 235 &lt; 2331 / 25 &lt; 2510 - Remote Code Execution - Shell Script The Jakarta Multipart parser in Apache Struts 2 23x before 2332 and 25x before 25101 has incorrect exception handling and error-message generation during file-upload attempts, which allows remote attackers to execute arbitrary commands via a crafted Content-Ty

CVE-2017-5638 Table of Contents Overview Dependencies Usage Overview This project is a prove-of-concept for the Apache Struts vulnerabilty The goal was to create software that can generate and test random IPs for the vulnerabilty described above Use this project on your own risk and for educational purpose only Dependencies cURL cURL is used to send the crafted header t

Exploit Demo for CVE-2017-5638 Completely based on githubcom/piesecurity/apache-struts2-CVE-2017-5638 Usage: Pre-requisites: have python, docker, maven and a jdk installed clone this repo run /mvnw clean package in project root run docker build -t hack run docker run -d -p 8080:8080 hack a If 8080 is in use, map to an open port eg -p 8888:8080 once container com

A tool to slice URLs

SlicePathsURL Usage • Installation • Why use SlicePathsURL? • How does SlicePathsURL work? SlicePathsURL slices a URL into directory levels to complement tools like Nuclei in searching for vulnerabilities in directories beyond the root of the URL - Installation &amp; Requirements: go install githubcom/erickfernandox/slicepathsurl@latest

An exploit (and library) for CVE-2017-5638 - Apache Struts2 S2-045 bug.

Struts2Shell An exploit (and library) for CVE-2017-5638 - Apache Struts2 S2-045 bug Installation $ npm install -g struts2shell Installation as Library $ npm install struts2shell Command Line Options -h, --help output usage information -V, --version output the version number -u, --url

CVE-2017-5638 Apache Struts 2 Introduction: Apache Struts 2 is an open source web application framework for developing Java EE Web applications,It is the second generation of the struts framework first released on 10th Oct 2006 Struts Framework is designed in a way that it helps creating Web applications that utilize a MVC architecture Apache Struts is widely used framework,

Build the struts-2.3.31 (CVE-2017-5638) environment

vulnerability_struts-2331 Build the struts-2331 (CVE-2017-5638) environment https request is possible environment Ubuntu 2004 Docker 201012 curl 7680 Server Startup We will use the tomcat:70-jre8 docker image Unzip struts-2331zip in a directory of your choice cd struts-2331 sudo docker build -t struts/2_3_31 sudo docker run -it --rm -p 8443:8443 struts/2_3_

ExploitDev Journey #10 | CVE-2017-5638 | Apache Struts 235 &lt; 2331 / 25 &lt; 2510 - Remote Code Execution Original Exploit: wwwexploit-dbcom/exploits/41570 Exploit name: Apache Struts RCE CVE: 2017-5638 Lab: Stratosphere - HackTheBox Description There is a vulnerability in Apache struts that allows a remote attacker to execute code and system comma

hackable docker image

Exploit Demo for CVE-2017-5638 Completely based on githubcom/piesecurity/apache-struts2-CVE-2017-5638 A realistic scenario where a reference project for a framework is deployed on a container but with terrible consequences To familiarise yourself look at the code and compile it Also investigate the dockerfile - does anything specific rise to get our attention? Shows

(m4ud) Apache Struts S2-045-RCE CVE-2017-5638 NT: Uses powershell, bash or msfvenom create payloads based on chosen OS, or you use only the -c flag to issue commands without lhost, lport, and osys! Options: -h, --help show this help message and exit -p RPORT, --port=RPORT RPORT, -t TARGET, --target=TARGET Vuln

DevSecOps Pipeline Demo

DevSecOps Pipeline Demo Requirements This demo uses Virtual box to deploy a local GitLab instance and configure it to run a DevSecOps Pipeline demo This demonstrates a DevSecOps Pipeline using an application that contains the Struts2 vulnerability (CVE-2017-5638) made famous in the Equifax breach Pre-requisites VirtualBox Vagrant Python You will also need the Vagrant Host

Demo app of THAT data broker's security breach

CVE-2017-5638 Demo app of, yes, that data broker's security breach Includes exploit code Basic usage (launch) mvn jetty:run Then go to localhost:8080/basic-struts/indexaction You should see the Welcome to Struts 2! message Vulnerability scan mvn site Acknowledgements Exploit code adap

JexBoss: Jboss (and Java Deserialization Vulnerabilities) verify and EXploitation Tool

JexBoss - JBoss (and others Java Deserialization Vulnerabilities) verify and EXploitation Tool JexBoss is a tool for testing and exploiting vulnerabilities in JBoss Application Server and others Java Platforms, Frameworks, Applications, etc Requirements Python &gt;= 27x urllib3 ipaddress Installation on Linux\Mac To install the latest version of JexBoss, please use the

📘 Anki's version of OWSAP Top 10. The OWASP Top 10 🪲 is a standard awareness document for developers and web application security. It represents a broad consensus about the most critical security risks to web applications.

OAOT - Anki owasp top 10 - owasp Questions Part I - Introduction Chapter 1 - What is OWASP? Q:: What is OWASP? A:: The Open Worldwide Application Security Project (OWASP) is an online community that produces freely-available articles, methodologies, documentation, tools, and technologies in the field of web application security The OWASP provides free and open resources It is

Struts Apache 2 based honeypot as well as a detection module for Apache 2 servers

StrutsHoneypot Cymmetria Research, 2017 wwwcymmetriacom/ Written by: Nir Krakowski (@nirkrakowksi), Imri Goldberg (@lorgandon) Contact: research@cymmetriacom Contact: research@cymmetriacom StrutsHoneypot is an Apache 2 based honeypot that includes a seperate detection module (apache mod) for Apache 2 servers that detects and/or blocks the sturts CVE 2017-5638 explo

An Ubuntu 16.04 VM Vulnerable to CVE 2017-5638

A Vulnerable Apache Struts Application Confirmed Vulnerabilities CVE Description URL 2017-5638 Remote Command Vulnerability in Apache Struts cvemitreorg/cgi-bin/cvenamecgi?name=CVE-2017-5638 Requirements: Vagrant VirtualBox SearchSploit (Optional) Setup $ git clone githubcom/evolvesecurity/vuln-struts2-vmgit $ cd vuln-struts2-vm

Exploit Demo for CVE-2017-5638 Completely based on githubcom/piesecurity/apache-struts2-CVE-2017-5638 A realistic scenario where a reference project for a framework is deployed on a container but with terrible consequences To familiarise yourself look at the code and compile it Also investigate the dockerfile - does anything specific rise to get our attention? Shows

Apache Struts 2.0 RCE vulnerability - Allows an attacker to inject OS commands into a web application through the content-type header

CVE-2017-5638 Apache Struts 20 RCE vulnerability This is a script to exploit CVE-2017-5638 - It allows an attacker to inject OS commands into a web application through the content-type header Apache Struts 2 is an open-source web application framework for developing Java EE web applications It uses and extends the Java Servlet API to encourage developers to adopt a model&ndas

Question 1: Identify and explain common and important components and concepts of web development markup languages? Markup languages are used to create web pages, as well as define all their structures and contents They use tags to format text, as well as data onto a web page Tags are defined with special chatacters or words that determine when to apply formatting and have a

Penetration-Testing-2 DC CyberSecurity Group Penetration Test Report Rekall Corporation Penetration Test Report Confidentiality Statement This document contains confidential and privileged information from Rekall Inc (henceforth known as Rekall) The information contained in this document is confidential and may constitute inside or n

ECE 9069 Companion Note on Apache Struts CVE-2017-5638 Source Background Equifax Data Breach Between May and July 2017, massive data breach affecting over 140 million users Stolen files contain critical personal information, credit card number, SIN, driver's license numbers Equifax paid up to $ 575 million Caused by 0-day attack on Apache Struts CVE-2017-5638 The

Struts2 Application Vulnerable to CVE-2017-5638. Explains how the exploit of the vulnerability works in relation to OGNL and the JakartaMultiPart parser.

Apache Struts2 Vulnerability | CVE-2017-5638 | Version 25 Disclaimer This is meant for educational, and research purposes only I do not authorize or endorse any illegal or unethical use of this projects contents or information Instructions To run the webapp: java -jar ms-cybersecurity-1jar (uses embedded Tomcat) Java 18 the webapp boots on port 8080 by default (loca

Developing security in the Software Development Life Cycle (SDLC)

Content SDLC (Software Development Life Cycle) Security Introdution to OWASP Top 10 [2021] SDLC (Software Development Life Cycle) Requirement Analysis Build out requirements for what it is that you are going to develop High level view of requirements and goals Extracts requirements or requirements analysis Clients have an idea of what they want - not how Scope defined a

An exploit for CVE-2017-5638

CVE-2017-5638 The Apache Struts 2 versions 23x before 2332 and 25x before 25101 have a flaw in their Jakarta Multipart parser This flaw causes incorrect handling of exceptions and generation of error messages when attempting to upload files As a result, attackers can remotely execute arbitrary commands by exploiting a crafted HTTP header such as Content-Type, Content

This is Valve for Tomcat7 to block Struts 2 Remote Code Execution vulnerability (CVE-2017-5638)

OgnlContentTypeRejectorValva This is Valve for Tomcat7 to block Struts 2 Remote Code Execution vulnerability (CVE-2017-5638)

FortiSIEM Incapsula WAF Parser Custom Why did we create a custom Incapsula WAF for FortiSIEM? Because the latest version of FortiSIEM doesn't support this parser or API yet Furthermore, Common Event Format(CEF) logs that have come to the FortiSIEM will be parsed to the generic CEF instead The structure of the parser &lt;patternDefinitions&gt; &lt;!-- Defi

Struts 2 web app that is vulnerable to CVE-2017-98505 and CVE-2017-5638

Vulnerable Struts2 application Requirements Maven (mavenapacheorg) Struts &lt;= 2510 CVE-2017-5638 - Apache Struts 2 Multipart form RCE Requirements Locate a URL that issues a multipart form POST Getting Started The application / server can be started with the following maven command: mvn jetty:run Run the exploit (wwwexploit-dbcom/exploits/41570

Telegram Bot to manage botnets created with struts vulnerability(CVE-2017-5638)

strutszeiro Telegram Bot to manage botnets created with struts vulnerability(CVE-2017-5638) #Dependencies pip install -r requerimentstxt #Config Create a telegram bot, save the API token in config/tokenconf Create a telegram group, save the group id in config/groupconf #Start python strutszeiropy #Telegram Usage /add url - test vulnerability and add the new server /exploit

Exploitable target to CVE-2017-5638

Exploit Demo for CVE-2017-5638 Completely based on githubcom/piesecurity/apache-struts2-CVE-2017-5638 Usage: Pre-requisites: have python, docker, maven and a jdk installed clone this repo run mvn clean package in project root run docker build -t hack run docker run -d -p 8080:8080 hack once container comes online - verify by running in browser To begin testing RCE

Sonatype Platform Demo (JAVA) ###Exploit Demo for CVE-2017-5638 Based on githubcom/piesecurity/apache-struts2-CVE-2017-5638 Demo-able Features: Java Application Struts2 2510 as vulnerable Ahab: Configuration of Ahab in the Dockerfile IDE Integration Breaking Changes Transitive Solver IaC Pack: awslargetfplan included Azure DevOps: azure-pipelinesyml

Developing security in the Software Development Life Cycle (SDLC)

Content SDLC (Software Development Life Cycle) Security Introdution to OWASP Top 10 [2021] SDLC (Software Development Life Cycle) Requirement Analysis Build out requirements for what it is that you are going to develop High level view of requirements and goals Extracts requirements or requirements analysis Clients have an idea of what they want - not how Scope defined a

Apache Struts (CVE-2017-5638) Shell

StrutsShell Apache Struts (CVE-2017-5638) Shell Introduction The "LowNoiseHG (LNHG) Struts Shell" ("StrutsShell" from now on) was conceived in March 2017 after realizing the usefulness of not having to exploit Apache Struts CVE-2017-5638 manually (HTTP GET requests by hand) and after realizing the respective metasploit module for this vulnerability did not w

CVE-2017-5638 Google Dork : "site:com filetype:action"

Struts2 S2-045(CVE-2017-5638)Exp with GUI

#Struts2 S2-045 (CVE-2017-5638) Exp Tools #Exp Function: Command Execute Get Target Website's Physical Path File Upload Getshell Default Webshell For Chopper Support HTTP/HTTPS Support URL With Any Port Note: Default Webshell's Password is s2045@exp #Notice The Project Is Intended For Educational/Research Purposes Mail: flyteas@gmailcom

Modded-Apache-Struts2-RCE-Exploit-v2-CVE-2017-5638-AUTO-EXPLOITER

apache-struts2-CVE-2017-5638 Demo Application and Exploit Sample Apache Struts2 App Struts2-showcase: mvnrepositorycom/artifact/orgapachestruts/struts2-showcase/2312 Exploit Reference: rapid7/metasploit-framework#8064

Jar application to send commands to vulnerable Struts2 apps

Commandline Emulator | CVE-2017-5638 Disclaimer This is meant for educational, and research purposes only I do not authorize or endorse any illegal or unethical use of this projects contents or information Proof of concept command line emulator to deliver payloads for CVE-2017-5638 Instructions Run: java -jar Sendjar Url: localhost/Webapp/action Supports most ba

Apache Struts CVE-2017-5638 RCE exploitation

Apache Struts CVE-2017-5638 exploitation This simple web application is built with vulnerable Apache Struts 2510 (CVE-2017-5638) It’s vulnerable to RCE Starting web application To start vulnerable web application, execute: mvn jetty:run The application will be accessible on port 8012 by default You can change it: mvn -Djettyhttpport=&lt;port&a

apache-struts2-CVE-2017-5638 Demo Application and Exploit Sample Apache Struts2 App Struts2-showcase: mvnrepositorycom/artifact/orgapachestruts/struts2-showcase/2312 Exploit Reference: rapid7/metasploit-framework#8064

Apache-Struts-v3 Script contiene la fusión de 3 vulnerabilidades de tipo RCE sobre ApacheStruts, además tiene la capacidad de crear shell servidor SHELL php Funcion Terminada :) jsp Funcion en desarrollo CVE ADD CVE-2013-2251 'action:', 'redirect:' and 'redirectAction' CVE-2017-5638 Content-Type CVE-2018-11776 'redirect:�

Projects, experiments and curiosities about Cybersecurity.

A place to collect my experiments and projects on cybersecurity Traffic-captures Exploit of CVE-2017-5638 (Apache struts) Presentation Smart Homes Risk Assessment Generic Risk Assessment study for an average smart home using OCTAVE Allegro Framework Presentation Open WiFi AP Captive Portal bypass Python script to demonstrate how a captive portal login page can be automat

Exploit Demo for CVE-2017-5638 Completely based on githubcom/piesecurity/apache-struts2-CVE-2017-5638 A realistic scenario where a reference project for a framework is deployed on a container but with terrible consequences To familiarise yourself look at the code and compile it Also investigate the dockerfile - does anything specific rise to get our attention? Shows

Exploit Demo for CVE-2017-5638 Completely based on githubcom/piesecurity/apache-struts2-CVE-2017-5638 A realistic scenario where a reference project for a framework is deployed on a container but with terrible consequences To familiarise yourself look at the code and compile it Also investigate the dockerfile - does anything specific rise to get our attention? Shows

A demo guide for Cloud One Container Security

How to Demo Container Security This is a how to demo guide for Cloud One Container Security, where we'll be able to see in-action the power of Runtime Scanning and Runtime Security working together to provide visibility and control over your cluster, including some shortcuts to deploy your own EKS cluster and Calico Good to Know This demo is targeted to give a better unde

struts2-showcase Struts Showcase Application source code packaged in version 2320 Exploits converted to Python3 from immunio/apache-struts2-CVE-2017-5638 Setup for Intellij Download IntelliJ community Import from VCS File &gt; Project Structure &gt; Project SDK &gt; JDK 18 Install JDK 8 if it does not exist View &gt; Maven &gt; Toggle 'Skip Tes

Example PHP Exploiter for CVE-2017-5638

CVE-2017-5638 Apache Struts2 Example PoC Exploit PHP Code for CVE-2017-5638 Usage php exploitphp "127001:8080/example/indexaction" "command" ** USE AT YOUR OWN RISK**

An exploit for CVE-2017-5638

CVE-2017-5638 The Apache Struts 2 versions 23x before 2332 and 25x before 25101 have a flaw in their Jakarta Multipart parser This flaw causes incorrect handling of exceptions and generation of error messages when attempting to upload files As a result, attackers can remotely execute arbitrary commands by exploiting a crafted HTTP header such as Content-Type, Content

Welcome to the F5 Advanced Web Application Firewall lab guide This series of lab exercises is intended to explain and demonstrate some key features of F5 Advanced Web Application Firewall The intend is to provide demos on the following content: Original Lab Guide Table of Contents Getting to Know the Environment Module 1: Lab Topology Class 1 - Getting started with WAF, Bot

These are just some script which you can use to detect and exploit the Apache Struts Vulnerability (CVE-2017-5638)

Struts-Apache-ExploitPack These are just some scripts which you can use to detect and exploit the Apache Struts Vulnerability (CVE-2017-5638) There is a MassScanner and Exploiter, You can use scanner to Mass Scan a list of URLs and then exploit them by Exploiter The Exploiter will run arbitrary shell commands on the vulnerable server

CVE-2017-5638 strutsapacheorg/docs/s2-016html cvemitreorg/cgi-bin/cvenamecgi?name=CVE-2017 Metasploit Framework Exploit Module for Apache Struts Content-Type exploit Have not tested against a windows server but tested against a linux server using the payload of generic/shell_bind_tcp

These are just some script which you can use to detect and exploit the Apache Struts Vulnerability (CVE-2017-5638)

Struts-Apache-ExploitPack These are just some scripts which you can use to detect and exploit the Apache Struts Vulnerability (CVE-2017-5638) There is a MassScanner and Exploiter, You can use scanner to Mass Scan a list of URLs and then exploit them by Exploiter The Exploiter will run arbitrary shell commands on the vulnerable server

Working POC for CVE 2017-5638

apache-struts-v2-CVE-2017-5638 Working POC for CVE 2017-5638 This repo contains a working python example demonstrating the RCE capabilities of CVE 2017-5638 Also for reference is included the Struts Showcase WAR file

Apache-Struts-v3 Script contiene la fusión de 3 vulnerabilidades de tipo RCE sobre ApacheStruts, además tiene la capacidad de crear shell servidor SHELL php terminado jsp proceso CVE ADD CVE-2013-2251 'action:', 'redirect:' and 'redirectAction' CVE-2017-5638 Content-Type CVE-2018-11776 'redirect:' and 'redirectAction

CVE-2017-5638 Apache Struts 2 Vulnerability Remote Code Execution Reverse shell from target Author: anarc0der - githubcom/anarcoder Tested with tomcat8 Install tomcat8 Deploy WAR file githubcom/nixawk/labs/tree/master/CVE-2017-5638 Ex: Open: $ nc -lnvp 4444 python2 struntsrcepy --target=localhost:8080/struts2_23151-showcase/showcaseaction --ip=127001 --

cve-2017-5638 참고_1 참고_2 참고_3 참고_4

Exploit Demo for CVE-2017-5638 Completely based on githubcom/piesecurity/apache-struts2-CVE-2017-5638 Usage: Pre-requisites: have docker, and a jre installed fork this repo run /mvnw clean package in project root run docker build -t hack run docker run -d -p 9080:8080 hack once container comes online - verify by running in browser localhost:9080 To begin te

CVE-2017-5638 Apache Struts 2 Vulnerability Remote Code Execution Reverse shell from target Author: anarc0der - githubcom/anarcoder Tested with tomcat8 Install tomcat8 Deploy WAR file githubcom/nixawk/labs/tree/master/CVE-2017-5638 Ex: Open: $ nc -lnvp 4444 python2 struntsrcepy --target=localhost:8080/struts2_23151-showcase/showcaseaction --ip=127001 --

Incident-Report An incident report is a cybersecurity post-incident review summarized in a written report This project is an example of an incident report as a cybersecuirty analyst on the findings of an Apache Strusts vunerability dubbed CVE 2017-5638 The attack was executed through espinoge by chinese milatry THe report intails an executive summary, detailed summary, major

An implementation of CVE-2017-5638

This tool uses an exploit in the Apache Struts framework called CVE-2017-5638 to gain access to a vunerable server through an OGNL injection It can be downloaded here (you will need to run it from the command line) Usage: struts_hack [target IP] [target port]

apache-struts2-CVE-2017-5638 Demo Application and Exploit Sample Apache Struts2 App Struts2-showcase: mvnrepositorycom/artifact/orgapachestruts/struts2-showcase/2312 Exploit Reference: rapid7/metasploit-framework#8064

test struts2 vulnerability CVE-2017-5638 in Mac OS X

test_struts2_vulnerability_CVE-2017-5638_in_MAC_OS_X test struts2 vulnerability CVE-2017-5638 in Mac OS X ###download test web app and run it in tomcat #install tomcat brew install tomcat #confirm where the tomcat installed ls -lF `which catalina` #confirm tomcat home dir ls -lF /usr/local/Cellar/tomcat/8511/libexec #create web app "struts2" in webapps of tomcat

CVE-2017-5638 (PoC Exploits)

CVE-2017-5638 CVE-2017-5638 (PoC Exploits)

A S2-045 remote command execution script, semi-interactive shell

S2-045 RCE Usage:python CVE-2017-5638-S2-045py url 脚本功能仅限命令执行,while死循环解决了多次命令执行的交互方式

struts2-showcase Struts Showcase Application source code packaged in version 2320 archiveapacheorg/dist/struts/2320/ Exploits converted to Python3 from githubcom/immunio/apache-struts2-CVE-2017-5638 Example exploit on Windows: python exploit3py dir

CVE-2017-5638 Converted to Python3 Original: wwwexploit-dbcom/exploits/41570

struts2-showcase Struts Showcase Application source code packaged in version 2320 Exploits converted to Python3 from immunio/apache-struts2-CVE-2017-5638 Setup for Intellij Download IntelliJ community Import from VCS File &gt; Project Structure &gt; Project SDK &gt; JDK 18 Install JDK 8 if it does not exist View &gt; Maven &gt; Toggle 'Skip Tes

PoC for CVE: 2017-5638 - Apache Struts2 S2-045

PoC for CVE: 2017-5638 - Apache Struts2 S2-045 Hi! I refactored the original script to use requests library, the other libraries were causing some errors to me Hope it helps! Usage: python3 cve-2017-5638 url cmd-command

JexBoss - JBoss (and others Java Deserialization Vulnerabilities) verify and EXploitation Tool JexBoss is a tool for testing and exploiting vulnerabilities in JBoss Application Server and others Java Platforms, Frameworks, Applications, etc Requirements Python &gt;= 27x urllib3 ipaddress Installation on Linux\Mac To install the latest version of JexBoss, please use the

JexBoss - JBoss (and others Java Deserialization Vulnerabilities) verify and EXploitation Tool JexBoss is a tool for testing and exploiting vulnerabilities in JBoss Application Server and others Java Platforms, Frameworks, Applications, etc Requirements Python &gt;= 27x urllib3 ipaddress Installation on Linux\Mac To install the latest version of JexBoss, please use the

Working Python test and PoC for CVE-2018-11776, includes Docker lab

CVE-2018-11776-Python-PoC hook-s3c (githubcom/hook-s3c), @hook_s3c on twitter Working Python test and PoC for CVE-2018-11776, originally appearing on; githubcom/hook-s3c/CVE-2018-11776-Python-PoC What's going on? Man Yue Mo from Semmle has disclosed an Struts2 RCE vulnerability, delivered in a payload encoded in the URL path of a request Versions affected are 2

An exploit for Apache Struts CVE-2017-5638

struts-pwn An exploit for Apache Struts CVE-2017-5638 Usage Testing a single URL python struts-pwnpy --url 'examplecom/struts2-showcase/indexaction' -c 'id' Testing a list of URLs python struts-pwnpy --list 'urlstxt' -c 'id' Checking if the vulnerability exists against a single URL python struts-pwnpy --check --url 'h

Overview Git repository for grey hat hacking talk Agenda What is a hacker What is grey hat hacking Why is it important (survey of fortune 500 companies) Talk about equifax hack link Run the equifax hack Show them the code Walk though what it does Run the exploit against a server Show the results Decode the passwords Talk about how it was executed and the fallout for equifax

(CVE-2017-5638) XworkStruts RCE Vuln test script

XworkStruts-RCE (CVE-2017-5638) XworkStruts RCE Vuln test script The Jakarta Multipart parser in Apache Struts 2 23x before 2332 and 25x before 25101 has incorrect exception handling and error-message generation during file-upload attempts, which allows remote attackers to execute arbitrary commands via a crafted Content-Type, Content-Disposition, or Content-Length HTT

JexBoss: Jboss (and Java Deserialization Vulnerabilities) verify and EXploitation Tool

JexBoss - JBoss (and others Java Deserialization Vulnerabilities) verify and EXploitation Tool JexBoss is a tool for testing and exploiting vulnerabilities in JBoss Application Server and others Java Platforms, Frameworks, Applications, etc Requirements Python &gt;= 27x urllib3 ipaddress Installation on Linux\Mac To install the latest version of JexBoss, please use the

Strutsy - Mass exploitation of Apache Struts (CVE-2017-5638) vulnerability

Strutsy Strutsy - Mass exploitation of Apache Struts (CVE-2017-5638) vulnerability Includes blind and time based code injection techniques which significantly reduces false negatives Other features include mass URL imports to scan multiple targets in one go Usage: python strutsypy urlstxt windows/linux/default ip-address All parameters are required urlstxt - file contai

This repository contains the solutions to the tasks presented in the course. You can explore how I found answers to their challenges and learn from the practical examples.

"Profession - WHITE HACKER" Course The course "Profession - WHITE HACKER" was developed by members of the professional community They have collected the best of their practical experience and talk about who white hat hackers are, what tasks they face, and how to master this profession Course Details Duration: 48 academic hours Attack Levels: 12 level

cve-2017-5638 Vulnerable site sample

cve-2017-5638 cve-2017-5638 Vulnerable site sample This project aims to demonstrate the CVE-2017-5638 exploitation for educational purpose For more informations, see cwikiapacheorg/confluence/display/WW/S2-045 Legal Disclaimer This project is made for educational and ethical testing purposes only Attacking targets without prior mutual consent is illegal It is the e

Exploit Demo for CVE-2017-5638 Completely based on githubcom/piesecurity/apache-struts2-CVE-2017-5638 A realistic scenario where a reference project for a framework is deployed on a container but with terrible consequences To familiarise yourself look at the code and compile it Also investigate the dockerfile - does anything specific rise to get our attention? Shows

WAF - Getting started with WAF, Bot Detection and Threat Campaigns Original Lab Guide This class will focus on a best practice approach to getting started with F5 WAF and application security This introductory class will give you guidance on deploying WAF services in a successive fashion This 141 class focuses entirely on the negative security model aspects of WAF configurati

detection for Apache Struts recon and compromise

I extended Scott Campbell's script further, made it more complicated :) While "HTTP_StrutsAttack" will stop 100% of the recon, there was still miniscule chance that if a scanner hits a vulnerable system, even though we'd block the scanner, vulnerable system might still do the wget included in the HTTP request and execute the malware Since we aren't blo

Kubernetes security presentation This repository contains manifest files for a presentation about Kubernetes security held at a meetup of the "München Kubernetes/Cloud-Native Meetup" group In order to deploy the sample application: kustomize build sample-app/base | kubectl apply -f - In order to deploy the sample application with security context in place:

Apache-Struts-v3 Script contiene la fusión de 3 vulnerabilidades de tipo RCE sobre ApacheStruts, además tiene la capacidad de crear shell servidor SHELL php Funcion Terminada :) jsp Funcion en desarrollo CVE ADD CVE-2013-2251 'action:', 'redirect:' and 'redirectAction' CVE-2017-5638 Content-Type CVE-2018-11776 'redirect:�

CVE-2017-5638 and CVE-2017-9793 S2-045-and-S2-052-Struts-2-in-1 Author: (m4ud) Struts pwning tool! Options: -h, --help show this help message and exit -p RPORT, --rport=RPORT RPORT, -t TARGET, --target=TARGET Vulnerable Target, -d DIRECTORY, --dir=DIRECTORY Struts Application directory,

Apache Struts 2.3.5 < 2.3.31 / 2.5 < 2.5.10 - Remote Code Execution - Shell Script

CVE-2017-5638 Apache Struts 235 &lt; 2331 / 25 &lt; 2510 - Remote Code Execution - Shell Script The Jakarta Multipart parser in Apache Struts 2 23x before 2332 and 25x before 25101 has incorrect exception handling and error-message generation during file-upload attempts, which allows remote attackers to execute arbitrary commands via a crafted Content-Ty

Overview Git repository for grey hat hacking talk Agenda What is a hacker What is grey hat hacking Why is it important (survey of fortune 500 companies) Talk about equifax hack link Run the equifax hack Show them the code Walk though what it does Run the exploit against a server Show the results Decode the passwords Talk about how it was executed and the fallout for equifax

Apache Struts CVE-2017-5638 exploitation This simple web application is built with vulnerable Apache Struts 2510 (CVE-2017-5638) It’s vulnerable to RCE Starting web application To start vulnerable web application, execute: mvn jetty:run The application will be accessible on port 8012 by default You can change it: mvn -Djettyhttpport=&lt;port&a

This script is intended to validate Apache Struts 2 vulnerability (CVE-2017-5638), AKA Struts-Shock.

CVE-2017-5638 This script is intended to validate Apache Struts 2 vulnerability (CVE-2017-5638), AKA Struts-Shock This is a completely harmless as it does not inject any malicious payload, only inject an HTTP header named 'STRUTS2-VALIDATION' in order to be able to validate whether is vulnerable Because of its multithread capability, it's able to run 25k+ appli

Struts02 s2-045 exploit program

CVE-2017-5638 | Struts s2-045 Description It is possible to perform a RCE attack with a malicious Content-Type value If the Content-Type value isn't valid an exception is thrown which is then used to display an error message to a user Affected versions Struts 235 Struts 2331 Struts 25 Struts 2510 Exploitation Remediation To remediate this issue, update the affec

Recent Articles

Beapy: Cryptojacking Worm Hits Enterprises in China
Symantec Threat Intelligence Blog • Security Response Attack Investigation Team • 24 Apr 2024

Cryptojacking campaign we have dubbed Beapy is exploiting the EternalBlue exploit and primarily impacting enterprises in China.

Posted: 24 Apr, 20196 Min ReadThreat Intelligence SubscribeFollowtwitterfacebooklinkedinBeapy: Cryptojacking Worm Hits Enterprises in ChinaCryptojacking campaign we have dubbed Beapy is exploiting the EternalBlue exploit and primarily impacting enterprises in China.Beapy is a cryptojacking campaign impacting enterprises that uses the EternalBlue exploit and stolen and hardcoded credentials to spread rapidly across networks. Beapy act...

Unveiling NKAbuse: a new multiplatform threat abusing the NKN protocol
Securelist • Kaspersky GERT • 14 Dec 2023

During an incident response performed by Kaspersky’s Global Emergency Response Team (GERT) and GReAT, we uncovered a novel multiplatform threat named “NKAbuse”. The malware utilizes NKN technology for data exchange between peers, functioning as a potent implant, and equipped with both flooder and backdoor capabilities. Written in Go, it is flexible enough to generate binaries compatible with various architectures. Our analysis suggests that the primary target of NKAbuse is Linux desktops. ...

US-CERT lists the 10 most-exploited security bugs and, yeah, it's mostly Microsoft holes people forgot to patch
The Register • Shaun Nichols in San Francisco • 14 May 2020

Update, update, update. Plus: Flash, Struts, Drupal also make appearances Sadly, 111 in this story isn't binary. It's decimal. It's the number of security fixes emitted by Microsoft this week

Vulnerabilities in Microsoft Windows, Office, and Windows Server, for which patches have been available for years, continue to be the favorite target for hackers looking to spread malware. A list posted by US-CERT this week rattles off the 10 most oft-targeted security vulnerabilities during the past three years, and finds that, shock horror, for the most part, keeping up with patching will keep you safe. Microsoft ranks highly in the list because its software is widely used, and provides the mo...

Hackers latch onto new Apache Struts megavuln to mine cryptocurrency
The Register • John Leyden • 30 Aug 2018

Underground forums alight with Struts chat, we hear Apache's latest SNAFU – Struts normal, all fscked up: Web app framework needs urgent patching Equifax's disastrous Struts patching blunder: THOUSANDS of other orgs did it too

A recently uncovered critical vulnerability in Apache Struts is already being exploited in the wild. Threat intel firm Volexity has warned that hackers are abusing the CVE-2018-11776 vuln to attack systems running Apache Struts 2, a popular open-source framework for developing applications in Java. Specifically, some nasty characters have abused the flaw while trying to install the CNRig cryptocurrency miner, researchers said. The vulnerability appears to be easier to exploit than the Struts fla...

IRS tax bods tell Americans to chill out about Equifax
The Register • Richard Chirgwin • 18 Oct 2017

Your personal data was probably already in crims' hands

The United States Internal Revenue Service has said that citizens affected by the Equifax breach need not panic, because it probably didn't reveal anything that hasn't already been stolen and the agency has tooled up to deal with fraudulent tax claims. Commissioner John Koskinen, discussing whether the breach would interfere with tax collection, told journalists “a significant percent of those taxpayers already had their information in the hands of criminals”, according to a report of a Q&am...

Sole Equifax security worker at fault for failed patch, says former CEO
The Register • Simon Sharwood • 04 Oct 2017

Someone failed to order the patch. If it was you, c'mere, have a hug. And a new identity Equifax CEO falls on his sword weeks after credit biz admits mega-breach

Recently-and-forcibly-retired Equifax CEO Rick Smith has laid the blame for his credit-check biz's IT security breach on a single member of the company's security team. In testimony on Tuesday before a US House subcommittee on consumer protection, Smith explained that Equifax has a protocol whereby news of important software patches is communicated to the appropriate people within a certain time. When details of security vulnerability CVE-2017-5638 landed in March 2017, bearing bad news about Ap...

Equifax couldn't find or patch vulnerable Struts implementations
The Register • Richard Chirgwin • 02 Oct 2017

Ex-CEO says company stayed silent about hack to stop crims piling on with more attacks

Equifax was just as much of a trash-fire as it looked: the company saw the Apache Struts 2 vulnerability warning, failed to patch its systems, and held back a public announcement for weeks for fear of “copycat” attacks. Those Infosec for Absolute Dummies tips were made official by ex-CEO Richard Smith, by way of evidence published by a US House committee ahead of his in-person appearance Tuesday. Smith's written statement [PDF] to the House Committee on Energy and Commerce says the company r...

Equifax's disastrous Struts patching blunder: THOUSANDS of other orgs did it too
The Register • John Leyden • 20 Sep 2017

Those are just the ones known to have downloaded outdated versions

Thousands of companies may be susceptible to the same type of hack that recently struck Equifax. The Equifax breach was the result of a vulnerable Apache Struts component. Software automation vendor Sonatype warns that 3,054 organisations downloaded the same Struts2 component exploited in the Equifax hack in the last 12 months. The affected version of Struts2 was publicly disclosed as vulnerable (CVE-2017-5638) on March 10, and was subsequently exploited at Equifax between May and late July, whe...

Equifax's IT leaders 'retire' as company says it knew about the bug that brought it down
The Register • Simon Sharwood • 17 Sep 2017

Company tried to find and patch vulnerable systems, but we know what happened next

Equifax's chief information officer and chief security officer “are retiring” and the company has admitted it knew Apache Struts needed patching in March, but looks to have fluffed attempts to secure the software. The retirements and more details about the company's mega-breach are revealed in a new entry to equifaxsecurity2017.com in which the company describes what it knew, when it knew it, and how it responded. The update reveals that the the attack hit the company's “U.S. online disput...

Equifax mega-breach: Security bod flags header config conflict
The Register • John Leyden • 15 Sep 2017

Help wanted at Equifax. Badly

Further evidence has emerged regarding the insecurity of Equifax’s web setup, as independent security researcher Scott Helme reports having uncovered all manner of problems with Equifax’s security header configuration. The finding from Helme comes as a date was confirmed for the Equifax CEO to appear before Congress earlier next month, and the FTC said it was investigating the credit reference agency. “Many of the headers are more about addressing the basics, but as a site that serves over...

Missed patch caused Equifax data breach
The Register • Simon Sharwood • 14 Sep 2017

Apache Struts was popped, but company had at least TWO MONTHS to fix it

Equifax has revealed that the cause of its massive data breach was a flaw it should have patched weeks before it was attacked. The company has updated its www.equifaxsecurity2017.com/ site with a new “A Progress Update for Consumers” that opens as follows: As the Apache Foundation pointed out earlier this week, it reported CVE-2017-5638 in March 2017. Doubt us? Here's the NIST notification that mentions it as being notified on March 10th. Equifax was breached in “mid-May” 2017, realised ...

Credit reference agencies faulted for poor patching
The Register • John Leyden • 13 Sep 2017

Hold our beers, Equifax

Updated Experian and Annual Credit Report.com – an organization set up by Equifax, Experian and Transunion to meet US consumer finance regulations – left themselves exposed to a serious vulnerability in Apache Struts earlier this year. The security shortcoming raises important questions following the disclosure of a mega-breach at Equifax last week that affected data on 143 million Americans and an as-yet unknown number of Canadians and Brits. Equifax only said that an unspecified web applic...

Apache Struts 2 needs patching, without delay. It's under attack now
The Register • Richard Chirgwin • 09 Mar 2017

Black hats testing remote code execution zero-day vulnerability

Infosec researchers have found a “dire” zero-day in Apache Struts 2, and it's under active attack. If you're a sysadmin using the Jakarta-based file upload Multipart parser under Apache Struts 2, Nick Biasini of Cisco's Talos advises applying the latest upgrade immediately. CVE-2017-5638 is documented at Rapid7's Metasploit Framework GitHub site. Talos's input adds urgency to getting the upgrade, because the organisation “found a high number of exploitation events. The majority of the expl...

NKabuse backdoor harnesses blockchain brawn to hit several architectures
The Register

Topics Security Off-Prem On-Prem Software Offbeat Special Features Vendor Voice Vendor Voice Resources Novel malware adapts delivers DDoS attacks and provides RAT functionality

Incident responders say they've found a new type of multi-platform malware abusing the New Kind of Network (NKN) protocol. Dubbed "NKAbuse" by the researchers, the Go-based backdoor offers criminal attackers a range of possibilities, including being able to DDoS or fling remote access trojans (RATs), and leans on NKN for more anonymous yet reliable data exchange. NKN is an open source protocol that lets users perform a peer-to-peer (P2P) data exchange over a public blockchain – like a cross be...

Equifax scores £11.1M slap on wrist over 2017 mega breach
The Register

Topics Security Off-Prem On-Prem Software Offbeat Special Features Vendor Voice Vendor Voice Resources Not quite a pound for every one of the 13.8 million affected UK citizens, and it could have been more

The UK's Financial Conduct Authority (FCA) has fined Equifax a smidge over £11 million ($13.6 million) for severe failings that put millions of consumers at risk of financial crime. The regulator branded the entire debacle "entirely preventable" – from Equifax's failure to promptly notify regulators to the way in which it misled the public over the severity of a security breach back in 2017. The original fine should have been greater; the true sum was £15,949,200 ($19,428,836) but the compan...

References

CWE-20https://isc.sans.edu/diary/22169https://github.com/rapid7/metasploit-framework/issues/8064https://cwiki.apache.org/confluence/display/WW/S2-045http://blog.trendmicro.com/trendlabs-security-intelligence/cve-2017-5638-apache-struts-vulnerability-remote-code-execution/http://blog.talosintelligence.com/2017/03/apache-0-day-exploited.htmlhttps://packetstormsecurity.com/files/141494/S2-45-poc.py.txthttps://nmap.org/nsedoc/scripts/http-vuln-cve2017-5638.htmlhttps://github.com/mazen160/struts-pwnhttps://exploit-db.com/exploits/41570https://twitter.com/theog150/status/841146956135124993https://arstechnica.com/security/2017/03/critical-vulnerability-under-massive-attack-imperils-high-impact-sites/http://www.securityfocus.com/bid/96729http://www.eweek.com/security/apache-struts-vulnerability-under-attack.htmlhttps://www.imperva.com/blog/2017/03/cve-2017-5638-new-remote-code-execution-rce-vulnerability-in-apache-struts-2/https://support.lenovo.com/us/en/product_security/len-14200https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03723en_ushttps://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03733en_ushttps://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03749en_ushttp://www.securitytracker.com/id/1037973http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.htmlhttps://www.exploit-db.com/exploits/41614/https://www.symantec.com/security-center/network-protection-security-advisories/SA145https://struts.apache.org/docs/s2-046.htmlhttps://struts.apache.org/docs/s2-045.htmlhttps://cwiki.apache.org/confluence/display/WW/S2-046https://www.kb.cert.org/vuls/id/834067https://security.netapp.com/advisory/ntap-20170310-0001/http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-002.txthttps://git1-us-west.apache.org/repos/asf?p=struts.git%3Ba=commit%3Bh=352306493971e7d5a756d61780d57a76eb1f519ahttps://git1-us-west.apache.org/repos/asf?p=struts.git%3Ba=commit%3Bh=6b8272ce47160036ed120a48345d9aa884477228https://lists.apache.org/thread.html/r6d03e45b81eab03580cf7f8bb51cb3e9a1b10a2cc0c6a2d3cc92ed0c%40%3Cannounce.apache.org%3Ehttps://lists.apache.org/thread.html/r90890afea72a9571d666820b2fe5942a0a5f86be406fa31da3dd0922%40%3Cannounce.apache.org%3Ehttps://lists.apache.org/thread.html/r1125f3044a0946d1e7e6f125a6170b58d413ebd4a95157e4608041c7%40%3Cannounce.apache.org%3Ehttps://nvd.nist.govhttps://packetstormsecurity.com/files/141576/Apache-Struts-2-2.3.x-2.5.x-Remote-Code-Execution.htmlhttps://www.exploit-db.com/exploits/41570/https://www.kb.cert.org/vuls/id/834067