Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1020 CNY

100%

CVE-2017-5638

KEV · Ransomware EPSS 94.27% · P100
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2017-5638

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
The Jakarta Multipart parser in Apache Struts 2 2.3.x before 2.3.32 and 2.5.x before 2.5.10.1 has incorrect exception handling and error-message generation during file-upload attempts, which allows remote attackers to execute arbitrary commands via a crafted Content-Type, Content-Disposition, or Content-Length HTTP header, as exploited in the wild in March 2017 with a Content-Type header containing a #cmd= string.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Apache Struts 2 输入验证错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Apache Struts是美国阿帕奇(Apache)软件基金会的一个开源项目,是一套用于创建企业级Java Web应用的开源MVC框架,主要提供两个版本框架产品,Struts 1和Struts 2。 Apache Struts 2 2.3.32之前的2 2.3.x版本和2.5.10.1之前的2.5.x版本中的Jakarta Multipart解析器存在安全漏洞,该漏洞源于程序没有正确处理文件上传。远程攻击者可借助带有#cmd=字符串的特制Content-Type HTTP头利用该漏洞执行任意命令。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
Apache Software FoundationApache Struts 2.3.x before 2.3.32 -

II. Public POCs for CVE-2017-5638

#POC DescriptionSource LinkShenlong Link
1Struts2 S2-045(CVE-2017-5638)Vulnerability environment - http://www.mottoin.com/97954.htmlhttps://github.com/PolarisLab/S2-045POC Details
2Struts2 S2-045(CVE-2017-5638)Exp with GUIhttps://github.com/Flyteas/Struts2-045-ExpPOC Details
3Nonehttps://github.com/bongbongco/cve-2017-5638POC Details
4S2-045 漏洞 POC-TOOLS CVE-2017-5638https://github.com/jas502n/S2-045-EXP-POC-TOOLSPOC Details
5Telegram Bot to manage botnets created with struts vulnerability(CVE-2017-5638)https://github.com/mthbernardes/strutszeiroPOC Details
6Example PoC Code for CVE-2017-5638 | Apache Struts Exploit https://github.com/xsscx/cve-2017-5638POC Details
7Demo Application and Exploithttps://github.com/immunio/apache-struts2-CVE-2017-5638POC Details
8This is Valve for Tomcat7 to block Struts 2 Remote Code Execution vulnerability (CVE-2017-5638)https://github.com/Masahiro-Yamada/OgnlContentTypeRejectorValvePOC Details
9Tweaking original PoC (https://github.com/rapid7/metasploit-framework/issues/8064) to work on self-signed certificates https://github.com/aljazceru/CVE-2017-5638-Apache-Struts2POC Details
10test struts2 vulnerability CVE-2017-5638 in Mac OS Xhttps://github.com/sjitech/test_struts2_vulnerability_CVE-2017-5638POC Details
11Nonehttps://github.com/jrrombaldo/CVE-2017-5638POC Details
12CVE: 2017-5638 in different formatshttps://github.com/random-robbie/CVE-2017-5638POC Details
13detection for Apache Struts recon and compromise https://github.com/initconf/CVE-2017-5638_strutsPOC Details
14An exploit for Apache Struts CVE-2017-5638https://github.com/mazen160/struts-pwnPOC Details
15These are just some script which you can use to detect and exploit the Apache Struts Vulnerability (CVE-2017-5638)https://github.com/ret2jazzy/Struts-Apache-ExploitPackPOC Details
16A php based exploiter for CVE-2017-5638.https://github.com/lolwaleet/ExpStrutsPOC Details
17Example PHP Exploiter for CVE-2017-5638https://github.com/oktavianto/CVE-2017-5638-Apache-Struts2POC Details
18cve-2017-5638 Vulnerable site samplehttps://github.com/jrrdev/cve-2017-5638POC Details
19Struts2 RCE CVE-2017-5638 non-intrusive check shell scripthttps://github.com/opt9/StrutshockPOC Details
20Apache Struts (CVE-2017-5638) Shellhttps://github.com/falcon-lnhg/StrutsShellPOC Details
21Nonehttps://github.com/bhagdave/CVE-2017-5638POC Details
22st2-046-poc CVE-2017-5638https://github.com/jas502n/st2-046-pocPOC Details
23S2-046|S2-045: Struts 2 Remote Code Execution vulnerability(CVE-2017-5638)https://github.com/KarzsGHR/S2-046_S2-045_POCPOC Details
24CVE-2017-5638https://github.com/gsfish/S2-ReaperPOC Details
25Nonehttps://github.com/mcassano/cve-2017-5638POC Details
26Struts2 RCE CVE-2017-5638 CLI shellhttps://github.com/opt9/StrutscliPOC Details
27Strutsy - Mass exploitation of Apache Struts (CVE-2017-5638) vulnerabilityhttps://github.com/tahmed11/strutsyPOC Details
28Apache Struts 2.0 RCE vulnerability - Allows an attacker to inject OS commands into a web application through the content-type header https://github.com/payatu/CVE-2017-5638POC Details
29CVE-2017-5638https://github.com/Aasron/Struts2-045-ExpPOC Details
30An exploit for CVE-2017-5638 Remote Code Execution (RCE) Vulnerability in Apache Struts 2https://github.com/SpiderMate/StutsfiPOC Details
31An exploit (and library) for CVE-2017-5638 - Apache Struts2 S2-045 bug.https://github.com/jpacora/Struts2ShellPOC Details
32Nonehttps://github.com/AndreasKl/CVE-2017-5638POC Details
33Struts-RCE CVE-2017-5638https://github.com/riyazwalikar/struts-rce-cve-2017-5638POC Details
34Nonehttps://github.com/homjxi0e/CVE-2017-5638POC Details
35CVE-2017-5638 Test environmenthttps://github.com/eeehit/CVE-2017-5638POC Details
36Nonehttps://github.com/sUbc0ol/Apache-Struts-CVE-2017-5638-RCE-Mass-ScannerPOC Details
37Nonehttps://github.com/sUbc0ol/Apache-Struts2-RCE-Exploit-v2-CVE-2017-5638POC Details
38Exploit created by: R4v3nBl4ck end Pacmanhttps://github.com/R4v3nBl4ck/Apache-Struts-2-CVE-2017-5638-Exploit-POC Details
39Nonehttps://github.com/Xhendos/CVE-2017-5638POC Details
40Nonehttps://github.com/TamiiLambrado/Apache-Struts-CVE-2017-5638-RCE-Mass-ScannerPOC Details
41Check for Struts Vulnerability CVE-2017-5638https://github.com/invisiblethreat/strutserPOC Details
42Nonehttps://github.com/lizhi16/CVE-2017-5638POC Details
43 An exploit for Apache Struts CVE-2017-5638https://github.com/c002/Apache-StrutsPOC Details
44Struts2 Application Vulnerable to CVE-2017-5638. Explains how the exploit of the vulnerability works in relation to OGNL and the JakartaMultiPart parser.https://github.com/pr0x1ma-byte/cybersecurity-struts2POC Details
45Working POC for CVE 2017-5638https://github.com/cafnet/apache-struts-v2-CVE-2017-5638POC Details
46Struts02 s2-045 exploit programhttps://github.com/0x00-0x00/CVE-2017-5638POC Details
47This is a sort of Java porting of the Python exploit at: https://www.exploit-db.com/exploits/41570/.https://github.com/m3ssap0/struts2_cve-2017-5638POC Details
48Golang exploit for CVE-2017-5638https://github.com/Greynad/struts2-jakarta-injectPOC Details
49Apache Struts CVE-2017-5638 RCE exploitationhttps://github.com/ggolawski/struts-rcePOC Details
50Apache Struts 2.3.5 < 2.3.31 / 2.5 < 2.5.10 - Remote Code Execution - Shell Scripthttps://github.com/win3zz/CVE-2017-5638POC Details
51Nonehttps://github.com/leandrocamposcardoso/CVE-2017-5638-Mass-ExploitPOC Details
52Exploitable target to CVE-2017-5638https://github.com/Iletee/struts2-rcePOC Details
53Apache Struts version analyzer (Ansible) based on CVE-2017-5638https://github.com/andypitcher/check_strutsPOC Details
54Nonehttps://github.com/un4ckn0wl3z/CVE-2017-5638POC Details
55CVE-2017-5638 (PoC Exploits)https://github.com/colorblindpentester/CVE-2017-5638POC Details
56Demo app of THAT data broker's security breachhttps://github.com/injcristianrojas/cve-2017-5638POC Details
57(CVE-2017-5638) XworkStruts RCE Vuln test scripthttps://github.com/ludy-dev/XworkStruts-RCEPOC Details
58Exploitable target to CVE-2017-5638https://github.com/sonatype-workshops/struts2-rcePOC Details
59PoC for CVE: 2017-5638 - Apache Struts2 S2-045https://github.com/jongmartinez/CVE-2017-5638POC Details
60Nonehttps://github.com/Badbird3/CVE-2017-5638POC Details
61An implementation of CVE-2017-5638https://github.com/jptr218/struts_hackPOC Details
62Build the struts-2.3.31 (CVE-2017-5638) environmenthttps://github.com/testpilot031/vulnerability_struts-2.3.31POC Details
63This script is intended to validate Apache Struts 2 vulnerability (CVE-2017-5638), AKA Struts-Shock.https://github.com/readloud/CVE-2017-5638POC Details
64Nonehttps://github.com/Tankirat/CVE-2017-5638POC Details
65Nonehttps://github.com/0xConstant/CVE-2017-5638POC Details
66this exemple of application permet to test the vunerability CVE_2017-5638https://github.com/mfdev-solution/Exploit-CVE-2017-5638POC Details
67An exploit for CVE-2017-5638https://github.com/mritunjay-k/CVE-2017-5638POC Details
68A exploit for CVE-2017-5638. This exploit works on versions 2.3.5-2.3.31 and 2.5 – 2.5.10https://github.com/FredBrave/CVE-2017-5638-ApacheStruts2.3.5POC Details
69This is the Apache Struts CVE-2017-5638 struts 2 vulnerability. The same CVE that resulted in the equifax database breach.https://github.com/donaldashdown/Common-Vulnerability-and-ExploitPOC Details
70This project demonstrates a Web Application Firewall (WAF) simulation using Flask and a vulnerability checker for CVE-2017-5638. The WAF middleware blocks HTTP requests containing specific patterns, and the vulnerability checker tests for and exploits the Apache Struts 2 vulnerability (CVE-2017-5638).https://github.com/Nithylesh/web-application-firewall-POC Details
71This repository provides a PoC for CVE-2017-5638, a remote code execution vulnerability in Apache Struts 2, exploitable via a crafted Content-Type HTTP header.https://github.com/kloutkake/CVE-2017-5638-PoCPOC Details
72Struts2 Application Vulnerable to CVE-2017-5638. Explains how the exploit of the vulnerability works in relation to OGNL and the JakartaMultiPart parser.https://github.com/sighup1/cybersecurity-struts2POC Details
73Proof of concept of CVE-2017-5638 including the whole setup of the Apache vulnerable serverhttps://github.com/Xernary/CVE-2017-5638-POCPOC Details
74Nonehttps://github.com/banomaly/CVE-2017-5638POC Details
75Apache Struts 2.3.x before 2.3.32 and 2.5.x before 2.5.10.1 is susceptible to remote command injection attacks. The Jakarta Multipart parser has incorrect exception handling and error-message generation during file upload attempts, which can allow an attacker to execute arbitrary commands via a crafted Content-Type, Content-Disposition, or Content-Length HTTP header. This was exploited in March 2017 with a Content-Type header containing a #cmd= string. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2017/CVE-2017-5638.yamlPOC Details
76Nonehttps://github.com/Threekiii/Awesome-POC/blob/master/%E4%B8%AD%E9%97%B4%E4%BB%B6%E6%BC%8F%E6%B4%9E/Apache%20Struts2%20S2-046%20%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2017-5638.mdPOC Details
77Nonehttps://github.com/Threekiii/Awesome-POC/blob/master/%E4%B8%AD%E9%97%B4%E4%BB%B6%E6%BC%8F%E6%B4%9E/Apache%20Struts2%20S2-045%20%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2017-5638.mdPOC Details
78Nonehttps://github.com/toothbrushsoapflannelbiscuits/cve-2017-5638POC Details
79CVE-2017-5638 Exploit Rewritten In Python By haxerr9https://github.com/haxerr9/CVE-2017-5638POC Details
80Nonehttps://github.com/QHxDr-dz/CVE-2017-5638POC Details
81Real-time anomaly detection system for Apache Struts CVE-2017-5638 exploit using streaming analytics, 3-gram byte analysis, and Count-Min Sketch. Detects RCE attacks without signatures, with <5ms latency and <0.1% false positives. https://github.com/joidiego/Detection-struts-cve-2017-5638-detectorPOC Details
82Apache Struts2 CVE-2017-5638 (Safe Educational Demo)https://github.com/iampetru/PoC-CVE-2017-5638POC Details
83Nonehttps://github.com/MuhammadAbdullah192/CVE-2017-5638-Remote-Code-Execution-Apache-Struts2-EXPLOITATIONPOC Details
84A hands-on simulation of CVE-2017-5638 (Apache Struts2 RCE), showcasing exploit reproduction, OS-level command execution, and mitigations such as input sanitization and endpoint monitoring. Built in Python/Flask with Jupyter notebook demoshttps://github.com/kaylertee/Computer-Security-Equifax-2017POC Details
85CVE-2017-5638- PoC https://github.com/FozilCV/Apache-Struts2-CVE-2017-5638POC Details
86Telegram Bot to manage botnets created with struts vulnerability(CVE-2017-5638)https://github.com/btamburi/strutszeiroPOC Details
87A Deliberately Vulnerable Web Application built on Struts 2 (CVE-2017-5638) and Log4J (CVE-2021-44228) for testing and demonstration of OWASP Top 10 Web Application Security Risks: A06:2021-Vulnerable and Outdated Components.https://github.com/timothyjxhn/DeliberatelyVulnerableWebAppPOC Details
88Nonehttps://github.com/ACharaf06/CVE-2017-5638-Attack-and-DefensePOC Details
89Nonehttps://github.com/smancke/CVE-2017-5638POC Details
90Software Security & Privacy ~ Assignement 3 : CVE PoChttps://github.com/louislafosse/CVE-2017-5638-assignementPOC Details
91A practical lab demonstrating the exploitation of a critical Remote Code Execution (RCE) vulnerability in Apache Struts2 (CVE-2017-5638) using Vulhub Docker environments. Includes setup instructions and commands to run the vulnerable container.https://github.com/soufiane-benchahyd/vulhub-struts2POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2017-5638

登录查看更多情报信息。
Exploit · 1

IV. Related Vulnerabilities

V. Comments for CVE-2017-5638

No comments yet


Leave a comment