Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2017-9805

KEV EPSS 94.32% · P100
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2017-9805

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
The REST Plugin in Apache Struts 2.1.1 through 2.3.x before 2.3.34 and 2.5.x before 2.5.13 uses an XStreamHandler with an instance of XStream for deserialization without any type filtering, which can lead to Remote Code Execution when deserializing XML payloads.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Apache Struts 代码问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Apache Struts是美国阿帕奇(Apache)软件基金会的一个开源项目,是一套用于创建企业级Java Web应用的开源MVC框架,主要提供两个版本框架产品,Struts 1和Struts 2。REST plugin是其中的一个处理传入URL请求的插件。 Apache Struts 2.5版本至2.5.12版本和2.1.2版本至2.3.33版本的REST插件存在远程代码执行漏洞。当Struts2通过REST插件使用XStream的实例xstreamhandler处理反序列化XML有效载荷时没有进行任
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
Apache Software FoundationApache Struts Apache Struts before 2.3.34 and 2.5.x before 2.5.13 -

II. Public POCs for CVE-2017-9805

#POC DescriptionSource LinkShenlong Link
1CVE 2017-9805https://github.com/luc10/struts-rce-cve-2017-9805POC Details
2cve -2017-9805https://github.com/hahwul/struts2-rce-cve-2017-9805-rubyPOC Details
3An exploit for Apache Struts CVE-2017-9805https://github.com/mazen160/struts-pwn_CVE-2017-9805POC Details
4An exploit for Apache Struts CVE-2017-9805https://github.com/Lone-Ranger/apache-struts-pwn_CVE-2017-9805POC Details
5Exploit script for Apache Struts2 REST Plugin XStream RCE (‎CVE-2017-9805)https://github.com/0x00-0x00/-CVE-2017-9805POC Details
6CVE-2017-9805 - Exploithttps://github.com/BeyondCy/S2-052POC Details
7Better Exploit Code For CVE 2017 9805 apache strutshttps://github.com/chrisjd20/cve-2017-9805.pyPOC Details
8Simple python script to fuzz site for CVE-2017-9805https://github.com/UbuntuStrike/struts_rest_rce_fuzz-CVE-2017-9805-POC Details
9A script to Fuzz and and exploit Apache struts CVE-2017-9805https://github.com/UbuntuStrike/CVE-2017-9805-Apache-Struts-Fuzz-N-SploitPOC Details
10Nonehttps://github.com/AvishkaSenadheera/CVE-2017-9805---Documentation---IT19143378POC Details
11Struts 2.5 - 2.5.12 REST Plugin XStream RCEhttps://github.com/wifido/CVE-2017-9805-ExploitPOC Details
12Nonehttps://github.com/rvermeulen/apache-struts-cve-2017-9805POC Details
13Exploit script for Apache Struts2 REST Plugin XStream RCE (‎CVE-2017-9805) https://github.com/jongmartinez/-CVE-2017-9805-POC Details
14struts2-rest-showcase 2.5.10https://github.com/z3bd/CVE-2017-9805POC Details
15CVE-2017-9805-Exploithttps://github.com/0xd3vil/CVE-2017-9805-ExploitPOC Details
16CVE-2017-9805 POChttps://github.com/Shakun8/CVE-2017-9805POC Details
17The REST Plugin in Apache Struts 2.1.1 through 2.3.x before 2.3.34 and 2.5.x before 2.5.13 uses an XStreamHandler with an instance of XStream for deserialization without any type of filtering, which can lead to remote code execution when deserializing XML payloads.https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2017/CVE-2017-9805.yamlPOC Details
18Nonehttps://github.com/Threekiii/Awesome-POC/blob/master/%E4%B8%AD%E9%97%B4%E4%BB%B6%E6%BC%8F%E6%B4%9E/Apache%20Struts2%20S2-052%20%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2017-9805.mdPOC Details
19Example web application that run on struts2 REST plugin 2.5.8, for demonstration purpose onlyhttps://github.com/NoSpaceAvailable/CVE-2017-9805_example_buildPOC Details
20CVE-2017-9805: Apache Struts 2 S2-052 RCE Exploit - PoC for Harvard University (OTD)https://github.com/Fl5xia/CVE-2017-9805POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2017-9805

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2017-9805

No comments yet


Leave a comment