0.975 High
EPSS
Percentile
100.0%
Name | struts_ognl |
---|---|
CVE | CVE-2017-5638 Exploit Pack |
VENDOR: Apache | |
NOTES: | |
The JAR Server will listen on the port provided in the UI. However, if that port is unavailable, | |
a random one will be chosen. |
Example vulnerable application: struts2-showcase in Struts 2.3.31 .
Example URL: http://172.16.196.137:8080/struts2-showcase/showcase.action
Versions tested:
> Ubuntu Linux 14.04.3
Java 7u22/Tomcat 8.5.11/Struts 2.3.31
Repeatability: One shot
References: [‘http://blog.trendmicro.com/trendlabs-security-intelligence/cve-2017-5638-apache-struts-vulnerability-remote-code-execution/’, ‘http://blog.talosintelligence.com/2017/03/apache-0-day-exploited.html’, ‘https://github.com/tengzhangchao/Struts2_045-Poc’]
CVE Url: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5638
0.975 High
EPSS
Percentile
100.0%