Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Apache Software Foundation | Apache Struts | 2.3 to 2.3.34 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Creating a vulnerable environment and the PoC | https://github.com/xfox64x/CVE-2018-11776 | POC Details |
| 2 | CVE-2018-11776(S2-057) EXPLOIT CODE | https://github.com/jiguangsdf/CVE-2018-11776 | POC Details |
| 3 | Working Python test and PoC for CVE-2018-11776, includes Docker lab | https://github.com/hook-s3c/CVE-2018-11776-Python-PoC | POC Details |
| 4 | An exploit for Apache Struts CVE-2018-11776 | https://github.com/mazen160/struts-pwn_CVE-2018-11776 | POC Details |
| 5 | Vulnerable docker container for CVE-2018-11776 | https://github.com/bhdresh/CVE-2018-11776 | POC Details |
| 6 | Environment for CVE-2018-11776 / S2-057 (Apache Struts 2) | https://github.com/knqyf263/CVE-2018-11776 | POC Details |
| 7 | Proof of Concept for CVE-2018-11776 | https://github.com/Ekultek/Strutter | POC Details |
| 8 | None | https://github.com/tuxotron/cve-2018-11776-docker | POC Details |
| 9 | A simple exploit for Apache Struts RCE S2-057 (CVE-2018-11776) | https://github.com/brianwrf/S2-057-CVE-2018-11776 | POC Details |
| 10 | This tool takes advantage of CVE-2018-11776 and Shodan to perform mass exploitation of verified and vulnerable Apache Struts servers. | https://github.com/649/Apache-Struts-Shodan-Exploit | POC Details |
| 11 | None | https://github.com/jezzus/CVE-2018-11776-Python-PoC | POC Details |
| 12 | cve-2018-11776 | https://github.com/cved-sources/cve-2018-11776 | POC Details |
| 13 | Spins up an isolated test environment for experimentation with Apache Struts vulnerability CVE-2018-11776. | https://github.com/OzNetNerd/apche-struts-vuln-demo-cve-2018-11776 | POC Details |
| 14 | Investigation of CVE-2018-11776 vulnerability that allows attackers to remotely execute code and gain control over Apache Struts-based applications. | https://github.com/cucadili/CVE-2018-11776 | POC Details |
| 15 | Critical Remote Code Execution Vulnerability (CVE-2018-11776) Found in Apache Struts. | https://github.com/ArunBhandarii/Apache-Struts-0Day-Exploit | POC Details |
| 16 | None | https://github.com/freshdemo/ApacheStruts-CVE-2018-11776 | POC Details |
| 17 | None | https://github.com/sonpt-afk/CVE-2018-11776-FIS | POC Details |
| 18 | Apache Struts versions 2.3 to 2.3.34 and 2.5 to 2.5.16 suffer from possible remote code execution when alwaysSelectFullNamespace is true (either by user or a plugin like Convention Plugin) and then: results are used with no namespace and in same time, its upper package have no or wildcard namespace and similar to results, same possibility when using url tag which doesn''t have value and action set and in same time, its upper package have no or wildcard namespace. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2018/CVE-2018-11776.yaml | POC Details |
| 19 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E4%B8%AD%E9%97%B4%E4%BB%B6%E6%BC%8F%E6%B4%9E/Apache%20Struts2%20S2-057%20%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2018-11776.md | POC Details |
| 20 | Critical Remote Code Execution Vulnerability (CVE-2018-11776) Found in Apache Struts. | https://github.com/arlyone/Apache-Struts-0Day-Exploit | POC Details |
| 21 | PoC Script for the CVE-2018-11776 vuln | https://github.com/m4sk0ff/CVE-2018-11776 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet