Apache Struts remote code execution proof of concept exploit that affects versions prior to 2.3.35 and 2.5.17.
378f12002cded8ad65b82350acd98b42b3b0fa65d697cfb00d3661569e72472f
This Metasploit module exploits a remote code execution vulnerability in Apache Struts versions 2.3 through 2.3.4, and 2.5 through 2.5.16. Remote code execution can be performed via an endpoint that makes use of a redirect action. Native payloads will be converted to executables and dropped in the server's temp dir. If this fails, try a cmd/* payload, which won't have to write to the disk.
d4db47de622ab194cae5e05a485e3f4743601277e19a6aa2f5275bcad5350dab
Apache versions 2.3 up to 2.3.34 and 2.5 up to 2.5.16 remote code execution exploit.
e3fe6d3322b4e7bf37f04eb80df88cf1ff50256ec220546413ce1608ec796227
Apache versions 2.3 up to 2.3.34 and 2.5 up to 2.5.16 remote code execution exploit.
abe49c2998c4daa60886325a8a939490e797caab4d4c51bc670b8d832053b6d4
Man Yue Mo from the Semmle Security Research team noticed that Apache Struts versions 2.3 to 2.3.34 and 2.5 to 2.5.16 suffer from possible remote code execution vulnerabilities.
e28e551a6d08832d9693c14547ef8d1e1b8a7bb9af46ee2af406329dc5a086c7