Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Apache Software Foundation | Apache Struts | 2.3.x before 2.3.32 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Struts2 S2-045(CVE-2017-5638)Vulnerability environment - http://www.mottoin.com/97954.html | https://github.com/PolarisLab/S2-045 | POC Details |
| 2 | Struts2 S2-045(CVE-2017-5638)Exp with GUI | https://github.com/Flyteas/Struts2-045-Exp | POC Details |
| 3 | None | https://github.com/bongbongco/cve-2017-5638 | POC Details |
| 4 | S2-045 漏洞 POC-TOOLS CVE-2017-5638 | https://github.com/jas502n/S2-045-EXP-POC-TOOLS | POC Details |
| 5 | Telegram Bot to manage botnets created with struts vulnerability(CVE-2017-5638) | https://github.com/mthbernardes/strutszeiro | POC Details |
| 6 | Example PoC Code for CVE-2017-5638 | Apache Struts Exploit | https://github.com/xsscx/cve-2017-5638 | POC Details |
| 7 | Demo Application and Exploit | https://github.com/immunio/apache-struts2-CVE-2017-5638 | POC Details |
| 8 | This is Valve for Tomcat7 to block Struts 2 Remote Code Execution vulnerability (CVE-2017-5638) | https://github.com/Masahiro-Yamada/OgnlContentTypeRejectorValve | POC Details |
| 9 | Tweaking original PoC (https://github.com/rapid7/metasploit-framework/issues/8064) to work on self-signed certificates | https://github.com/aljazceru/CVE-2017-5638-Apache-Struts2 | POC Details |
| 10 | test struts2 vulnerability CVE-2017-5638 in Mac OS X | https://github.com/sjitech/test_struts2_vulnerability_CVE-2017-5638 | POC Details |
| 11 | None | https://github.com/jrrombaldo/CVE-2017-5638 | POC Details |
| 12 | CVE: 2017-5638 in different formats | https://github.com/random-robbie/CVE-2017-5638 | POC Details |
| 13 | detection for Apache Struts recon and compromise | https://github.com/initconf/CVE-2017-5638_struts | POC Details |
| 14 | An exploit for Apache Struts CVE-2017-5638 | https://github.com/mazen160/struts-pwn | POC Details |
| 15 | These are just some script which you can use to detect and exploit the Apache Struts Vulnerability (CVE-2017-5638) | https://github.com/ret2jazzy/Struts-Apache-ExploitPack | POC Details |
| 16 | A php based exploiter for CVE-2017-5638. | https://github.com/lolwaleet/ExpStruts | POC Details |
| 17 | Example PHP Exploiter for CVE-2017-5638 | https://github.com/oktavianto/CVE-2017-5638-Apache-Struts2 | POC Details |
| 18 | cve-2017-5638 Vulnerable site sample | https://github.com/jrrdev/cve-2017-5638 | POC Details |
| 19 | Struts2 RCE CVE-2017-5638 non-intrusive check shell script | https://github.com/opt9/Strutshock | POC Details |
| 20 | Apache Struts (CVE-2017-5638) Shell | https://github.com/falcon-lnhg/StrutsShell | POC Details |
| 21 | None | https://github.com/bhagdave/CVE-2017-5638 | POC Details |
| 22 | st2-046-poc CVE-2017-5638 | https://github.com/jas502n/st2-046-poc | POC Details |
| 23 | S2-046|S2-045: Struts 2 Remote Code Execution vulnerability(CVE-2017-5638) | https://github.com/KarzsGHR/S2-046_S2-045_POC | POC Details |
| 24 | CVE-2017-5638 | https://github.com/gsfish/S2-Reaper | POC Details |
| 25 | None | https://github.com/mcassano/cve-2017-5638 | POC Details |
| 26 | Struts2 RCE CVE-2017-5638 CLI shell | https://github.com/opt9/Strutscli | POC Details |
| 27 | Strutsy - Mass exploitation of Apache Struts (CVE-2017-5638) vulnerability | https://github.com/tahmed11/strutsy | POC Details |
| 28 | Apache Struts 2.0 RCE vulnerability - Allows an attacker to inject OS commands into a web application through the content-type header | https://github.com/payatu/CVE-2017-5638 | POC Details |
| 29 | CVE-2017-5638 | https://github.com/Aasron/Struts2-045-Exp | POC Details |
| 30 | An exploit for CVE-2017-5638 Remote Code Execution (RCE) Vulnerability in Apache Struts 2 | https://github.com/SpiderMate/Stutsfi | POC Details |
| 31 | An exploit (and library) for CVE-2017-5638 - Apache Struts2 S2-045 bug. | https://github.com/jpacora/Struts2Shell | POC Details |
| 32 | None | https://github.com/AndreasKl/CVE-2017-5638 | POC Details |
| 33 | Struts-RCE CVE-2017-5638 | https://github.com/riyazwalikar/struts-rce-cve-2017-5638 | POC Details |
| 34 | None | https://github.com/homjxi0e/CVE-2017-5638 | POC Details |
| 35 | CVE-2017-5638 Test environment | https://github.com/eeehit/CVE-2017-5638 | POC Details |
| 36 | None | https://github.com/sUbc0ol/Apache-Struts-CVE-2017-5638-RCE-Mass-Scanner | POC Details |
| 37 | None | https://github.com/sUbc0ol/Apache-Struts2-RCE-Exploit-v2-CVE-2017-5638 | POC Details |
| 38 | Exploit created by: R4v3nBl4ck end Pacman | https://github.com/R4v3nBl4ck/Apache-Struts-2-CVE-2017-5638-Exploit- | POC Details |
| 39 | None | https://github.com/Xhendos/CVE-2017-5638 | POC Details |
| 40 | None | https://github.com/TamiiLambrado/Apache-Struts-CVE-2017-5638-RCE-Mass-Scanner | POC Details |
| 41 | Check for Struts Vulnerability CVE-2017-5638 | https://github.com/invisiblethreat/strutser | POC Details |
| 42 | None | https://github.com/lizhi16/CVE-2017-5638 | POC Details |
| 43 | An exploit for Apache Struts CVE-2017-5638 | https://github.com/c002/Apache-Struts | POC Details |
| 44 | Struts2 Application Vulnerable to CVE-2017-5638. Explains how the exploit of the vulnerability works in relation to OGNL and the JakartaMultiPart parser. | https://github.com/pr0x1ma-byte/cybersecurity-struts2 | POC Details |
| 45 | Working POC for CVE 2017-5638 | https://github.com/cafnet/apache-struts-v2-CVE-2017-5638 | POC Details |
| 46 | Struts02 s2-045 exploit program | https://github.com/0x00-0x00/CVE-2017-5638 | POC Details |
| 47 | This is a sort of Java porting of the Python exploit at: https://www.exploit-db.com/exploits/41570/. | https://github.com/m3ssap0/struts2_cve-2017-5638 | POC Details |
| 48 | Golang exploit for CVE-2017-5638 | https://github.com/Greynad/struts2-jakarta-inject | POC Details |
| 49 | Apache Struts CVE-2017-5638 RCE exploitation | https://github.com/ggolawski/struts-rce | POC Details |
| 50 | Apache Struts 2.3.5 < 2.3.31 / 2.5 < 2.5.10 - Remote Code Execution - Shell Script | https://github.com/win3zz/CVE-2017-5638 | POC Details |
| 51 | None | https://github.com/leandrocamposcardoso/CVE-2017-5638-Mass-Exploit | POC Details |
| 52 | Exploitable target to CVE-2017-5638 | https://github.com/Iletee/struts2-rce | POC Details |
| 53 | Apache Struts version analyzer (Ansible) based on CVE-2017-5638 | https://github.com/andypitcher/check_struts | POC Details |
| 54 | None | https://github.com/un4ckn0wl3z/CVE-2017-5638 | POC Details |
| 55 | CVE-2017-5638 (PoC Exploits) | https://github.com/colorblindpentester/CVE-2017-5638 | POC Details |
| 56 | Demo app of THAT data broker's security breach | https://github.com/injcristianrojas/cve-2017-5638 | POC Details |
| 57 | (CVE-2017-5638) XworkStruts RCE Vuln test script | https://github.com/ludy-dev/XworkStruts-RCE | POC Details |
| 58 | Exploitable target to CVE-2017-5638 | https://github.com/sonatype-workshops/struts2-rce | POC Details |
| 59 | PoC for CVE: 2017-5638 - Apache Struts2 S2-045 | https://github.com/jongmartinez/CVE-2017-5638 | POC Details |
| 60 | None | https://github.com/Badbird3/CVE-2017-5638 | POC Details |
| 61 | An implementation of CVE-2017-5638 | https://github.com/jptr218/struts_hack | POC Details |
| 62 | Build the struts-2.3.31 (CVE-2017-5638) environment | https://github.com/testpilot031/vulnerability_struts-2.3.31 | POC Details |
| 63 | This script is intended to validate Apache Struts 2 vulnerability (CVE-2017-5638), AKA Struts-Shock. | https://github.com/readloud/CVE-2017-5638 | POC Details |
| 64 | None | https://github.com/Tankirat/CVE-2017-5638 | POC Details |
| 65 | None | https://github.com/0xConstant/CVE-2017-5638 | POC Details |
| 66 | this exemple of application permet to test the vunerability CVE_2017-5638 | https://github.com/mfdev-solution/Exploit-CVE-2017-5638 | POC Details |
| 67 | An exploit for CVE-2017-5638 | https://github.com/mritunjay-k/CVE-2017-5638 | POC Details |
| 68 | A exploit for CVE-2017-5638. This exploit works on versions 2.3.5-2.3.31 and 2.5 – 2.5.10 | https://github.com/FredBrave/CVE-2017-5638-ApacheStruts2.3.5 | POC Details |
| 69 | This is the Apache Struts CVE-2017-5638 struts 2 vulnerability. The same CVE that resulted in the equifax database breach. | https://github.com/donaldashdown/Common-Vulnerability-and-Exploit | POC Details |
| 70 | This project demonstrates a Web Application Firewall (WAF) simulation using Flask and a vulnerability checker for CVE-2017-5638. The WAF middleware blocks HTTP requests containing specific patterns, and the vulnerability checker tests for and exploits the Apache Struts 2 vulnerability (CVE-2017-5638). | https://github.com/Nithylesh/web-application-firewall- | POC Details |
| 71 | This repository provides a PoC for CVE-2017-5638, a remote code execution vulnerability in Apache Struts 2, exploitable via a crafted Content-Type HTTP header. | https://github.com/kloutkake/CVE-2017-5638-PoC | POC Details |
| 72 | Struts2 Application Vulnerable to CVE-2017-5638. Explains how the exploit of the vulnerability works in relation to OGNL and the JakartaMultiPart parser. | https://github.com/sighup1/cybersecurity-struts2 | POC Details |
| 73 | Proof of concept of CVE-2017-5638 including the whole setup of the Apache vulnerable server | https://github.com/Xernary/CVE-2017-5638-POC | POC Details |
| 74 | None | https://github.com/banomaly/CVE-2017-5638 | POC Details |
| 75 | Apache Struts 2.3.x before 2.3.32 and 2.5.x before 2.5.10.1 is susceptible to remote command injection attacks. The Jakarta Multipart parser has incorrect exception handling and error-message generation during file upload attempts, which can allow an attacker to execute arbitrary commands via a crafted Content-Type, Content-Disposition, or Content-Length HTTP header. This was exploited in March 2017 with a Content-Type header containing a #cmd= string. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2017/CVE-2017-5638.yaml | POC Details |
| 76 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E4%B8%AD%E9%97%B4%E4%BB%B6%E6%BC%8F%E6%B4%9E/Apache%20Struts2%20S2-046%20%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2017-5638.md | POC Details |
| 77 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E4%B8%AD%E9%97%B4%E4%BB%B6%E6%BC%8F%E6%B4%9E/Apache%20Struts2%20S2-045%20%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2017-5638.md | POC Details |
| 78 | None | https://github.com/toothbrushsoapflannelbiscuits/cve-2017-5638 | POC Details |
| 79 | CVE-2017-5638 Exploit Rewritten In Python By haxerr9 | https://github.com/haxerr9/CVE-2017-5638 | POC Details |
| 80 | None | https://github.com/QHxDr-dz/CVE-2017-5638 | POC Details |
| 81 | Real-time anomaly detection system for Apache Struts CVE-2017-5638 exploit using streaming analytics, 3-gram byte analysis, and Count-Min Sketch. Detects RCE attacks without signatures, with <5ms latency and <0.1% false positives. | https://github.com/joidiego/Detection-struts-cve-2017-5638-detector | POC Details |
| 82 | Apache Struts2 CVE-2017-5638 (Safe Educational Demo) | https://github.com/iampetru/PoC-CVE-2017-5638 | POC Details |
| 83 | None | https://github.com/MuhammadAbdullah192/CVE-2017-5638-Remote-Code-Execution-Apache-Struts2-EXPLOITATION | POC Details |
| 84 | A hands-on simulation of CVE-2017-5638 (Apache Struts2 RCE), showcasing exploit reproduction, OS-level command execution, and mitigations such as input sanitization and endpoint monitoring. Built in Python/Flask with Jupyter notebook demos | https://github.com/kaylertee/Computer-Security-Equifax-2017 | POC Details |
| 85 | CVE-2017-5638- PoC | https://github.com/FozilCV/Apache-Struts2-CVE-2017-5638 | POC Details |
| 86 | Telegram Bot to manage botnets created with struts vulnerability(CVE-2017-5638) | https://github.com/btamburi/strutszeiro | POC Details |
| 87 | A Deliberately Vulnerable Web Application built on Struts 2 (CVE-2017-5638) and Log4J (CVE-2021-44228) for testing and demonstration of OWASP Top 10 Web Application Security Risks: A06:2021-Vulnerable and Outdated Components. | https://github.com/timothyjxhn/DeliberatelyVulnerableWebApp | POC Details |
| 88 | None | https://github.com/ACharaf06/CVE-2017-5638-Attack-and-Defense | POC Details |
| 89 | None | https://github.com/smancke/CVE-2017-5638 | POC Details |
| 90 | Software Security & Privacy ~ Assignement 3 : CVE PoC | https://github.com/louislafosse/CVE-2017-5638-assignement | POC Details |
| 91 | A practical lab demonstrating the exploitation of a critical Remote Code Execution (RCE) vulnerability in Apache Struts2 (CVE-2017-5638) using Vulhub Docker environments. Includes setup instructions and commands to run the vulnerable container. | https://github.com/soufiane-benchahyd/vulhub-struts2 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet