Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-31805 PoC — Forced OGNL evaluation, when evaluated on raw not validated user input in tag attributes, may lead to RCE.

Source
Associated Vulnerability
Title:Forced OGNL evaluation, when evaluated on raw not validated user input in tag attributes, may lead to RCE. (CVE-2021-31805)
Description:The fix issued for CVE-2020-17530 was incomplete. So from Apache Struts 2.0.0 to 2.5.29, still some of the tag’s attributes could perform a double evaluation if a developer applied forced OGNL evaluation by using the %{...} syntax. Using forced OGNL evaluation on untrusted user input can lead to a Remote Code Execution and security degradation.
Description
Apache Struts2 S2-062远程代码执行漏洞(CVE-2021-31805) 支持批量扫描漏洞及漏洞利用
Readme
# S2-062
CVE-2021-31805/s2-062 批量扫描及漏洞利用

请遵守法律法规,禁止未授权攻击网站系统

# 使用说明
## 批量扫描模式
```
python3 CVE-2021-31805.py -m scan -f 123.txt
```
![scan_mode](scan.jpg)

## 命令执行模式
```
python3 CVE-2021-31805.py -u https://xxx.xxx.com:8080 -c id
```
![rce_mode](rce.jpg)

![burp](burp.jpg)
File Snapshot

[4.0K] /data/pocs/d26da9a0ff373de9b78807be812a9f955dd769eb ├── [353K] burp.jpg ├── [6.4K] CVE-2021-31805.py ├── [ 61K] rce.jpg ├── [ 363] README.md ├── [ 48] requirements.txt └── [ 61K] scan.jpg 0 directories, 6 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →