exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 5 of 5 RSS Feed

CVE-2018-11776

Status Candidate

Overview

Apache Struts versions 2.3 to 2.3.34 and 2.5 to 2.5.16 suffer from possible Remote Code Execution when alwaysSelectFullNamespace is true (either by user or a plugin like Convention Plugin) and then: results are used with no namespace and in same time, its upper package have no or wildcard namespace and similar to results, same possibility when using url tag which doesn't have value and action set and in same time, its upper package have no or wildcard namespace.

Related Files

Apache Struts Remote Code Execution
Posted Jun 11, 2023
Authored by GitHub Security Lab

Apache Struts remote code execution proof of concept exploit that affects versions prior to 2.3.35 and 2.5.17.

tags | exploit, remote, code execution, proof of concept
advisories | CVE-2018-11776
SHA-256 | 378f12002cded8ad65b82350acd98b42b3b0fa65d697cfb00d3661569e72472f
Apache Struts 2 Namespace Redirect OGNL Injection
Posted Sep 7, 2018
Authored by wvu, Man Yue Mo, hook-s3c, asoto-r7 | Site metasploit.com

This Metasploit module exploits a remote code execution vulnerability in Apache Struts versions 2.3 through 2.3.4, and 2.5 through 2.5.16. Remote code execution can be performed via an endpoint that makes use of a redirect action. Native payloads will be converted to executables and dropped in the server's temp dir. If this fails, try a cmd/* payload, which won't have to write to the disk.

tags | exploit, remote, code execution
advisories | CVE-2018-11776
SHA-256 | d4db47de622ab194cae5e05a485e3f4743601277e19a6aa2f5275bcad5350dab
Apache Struts 2.3 / 2.5 Remote Code Execution
Posted Aug 26, 2018
Authored by Mazin Ahmed

Apache versions 2.3 up to 2.3.34 and 2.5 up to 2.5.16 remote code execution exploit.

tags | exploit, remote, code execution
advisories | CVE-2018-11776
SHA-256 | e3fe6d3322b4e7bf37f04eb80df88cf1ff50256ec220546413ce1608ec796227
Apache Struts 2.3 / 2.5 Remote Code Execution
Posted Aug 25, 2018
Authored by hook-s3c

Apache versions 2.3 up to 2.3.34 and 2.5 up to 2.5.16 remote code execution exploit.

tags | exploit, remote, code execution
advisories | CVE-2018-11776
SHA-256 | abe49c2998c4daa60886325a8a939490e797caab4d4c51bc670b8d832053b6d4
Apache Struts 2.x Remote Code Execution
Posted Aug 23, 2018
Authored by Man Yue Mo

Man Yue Mo from the Semmle Security Research team noticed that Apache Struts versions 2.3 to 2.3.34 and 2.5 to 2.5.16 suffer from possible remote code execution vulnerabilities.

tags | advisory, remote, vulnerability, code execution
advisories | CVE-2018-11776
SHA-256 | e28e551a6d08832d9693c14547ef8d1e1b8a7bb9af46ee2af406329dc5a086c7
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    69 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close