Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1110 CNY

100%

CVE-2017-5638 PoC — Apache Struts 2 输入验证错误漏洞

Source
Associated Vulnerability
Title:Apache Struts 2 输入验证错误漏洞 (CVE-2017-5638)
Description:The Jakarta Multipart parser in Apache Struts 2 2.3.x before 2.3.32 and 2.5.x before 2.5.10.1 has incorrect exception handling and error-message generation during file-upload attempts, which allows remote attackers to execute arbitrary commands via a crafted Content-Type, Content-Disposition, or Content-Length HTTP header, as exploited in the wild in March 2017 with a Content-Type header containing a #cmd= string.
Description
Proof of concept of CVE-2017-5638 including the whole setup of the Apache vulnerable server
Readme
# CVE-2017-5638-POC

Vulnerable server setup and proof of concept of CVE-2017-5638 (remote code execution vulnerability in an Apache component) 

## Server

The vulnerable server runs in a docker container, the image can be created using the Dockerfile, running this in the same folder of it:

docker build --tag 'vuln-server' .


The container can then be created and ran using:

docker run -p 8080:8080 -it vuln-server
File Snapshot

[4.0K] /data/pocs/17e49cad32a35d0aaad224fc11d8f019790db4d0 ├── [ 387] Dockerfile ├── [1.0K] pwn-page.jsp ├── [ 421] README.md └── [3.4K] server-setup-script.sh 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →