Exploits / Vulnerability Discovered : 2020-10-20 |
Type : webapps |
Platform : java
This exploit / vulnerability Apache struts 2 defaultactionmapper prefixes ognl code execution is for educational purposes only and if it is used you will do on your own risk!
#!/usr/bin/python
#
# coding=utf-8
#
# Struts 2 DefaultActionMapper Exploit [S2-016]
# Interactive Shell for CVE-2013-2251
#
# The Struts 2 DefaultActionMapper supports a method for short-circuit
navigation state changes by prefixing parameters with
# "action:" or "redirect:", followed by a desired navigational target
expression. This mechanism was intended to help with
# attaching navigational information to buttons within forms.
#
# https://struts.apache.org/docs/s2-016.html
# Jonatas Fil (@exploitation)