exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 5 of 5 RSS Feed

CVE-2018-11776

Status Candidate

Overview

Apache Struts versions 2.3 to 2.3.34 and 2.5 to 2.5.16 suffer from possible Remote Code Execution when alwaysSelectFullNamespace is true (either by user or a plugin like Convention Plugin) and then: results are used with no namespace and in same time, its upper package have no or wildcard namespace and similar to results, same possibility when using url tag which doesn't have value and action set and in same time, its upper package have no or wildcard namespace.

Related Files

Apache Struts Remote Code Execution
Posted Jun 11, 2023
Authored by GitHub Security Lab

Apache Struts remote code execution proof of concept exploit that affects versions prior to 2.3.35 and 2.5.17.

tags | exploit, remote, code execution, proof of concept
advisories | CVE-2018-11776
SHA-256 | 378f12002cded8ad65b82350acd98b42b3b0fa65d697cfb00d3661569e72472f
Apache Struts 2 Namespace Redirect OGNL Injection
Posted Sep 7, 2018
Authored by wvu, Man Yue Mo, hook-s3c, asoto-r7 | Site metasploit.com

This Metasploit module exploits a remote code execution vulnerability in Apache Struts versions 2.3 through 2.3.4, and 2.5 through 2.5.16. Remote code execution can be performed via an endpoint that makes use of a redirect action. Native payloads will be converted to executables and dropped in the server's temp dir. If this fails, try a cmd/* payload, which won't have to write to the disk.

tags | exploit, remote, code execution
advisories | CVE-2018-11776
SHA-256 | d4db47de622ab194cae5e05a485e3f4743601277e19a6aa2f5275bcad5350dab
Apache Struts 2.3 / 2.5 Remote Code Execution
Posted Aug 26, 2018
Authored by Mazin Ahmed

Apache versions 2.3 up to 2.3.34 and 2.5 up to 2.5.16 remote code execution exploit.

tags | exploit, remote, code execution
advisories | CVE-2018-11776
SHA-256 | e3fe6d3322b4e7bf37f04eb80df88cf1ff50256ec220546413ce1608ec796227
Apache Struts 2.3 / 2.5 Remote Code Execution
Posted Aug 25, 2018
Authored by hook-s3c

Apache versions 2.3 up to 2.3.34 and 2.5 up to 2.5.16 remote code execution exploit.

tags | exploit, remote, code execution
advisories | CVE-2018-11776
SHA-256 | abe49c2998c4daa60886325a8a939490e797caab4d4c51bc670b8d832053b6d4
Apache Struts 2.x Remote Code Execution
Posted Aug 23, 2018
Authored by Man Yue Mo

Man Yue Mo from the Semmle Security Research team noticed that Apache Struts versions 2.3 to 2.3.34 and 2.5 to 2.5.16 suffer from possible remote code execution vulnerabilities.

tags | advisory, remote, vulnerability, code execution
advisories | CVE-2018-11776
SHA-256 | e28e551a6d08832d9693c14547ef8d1e1b8a7bb9af46ee2af406329dc5a086c7
Page 1 of 1
Back1Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    0 Files
  • 6
    Sep 6th
    0 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    0 Files
  • 9
    Sep 9th
    0 Files
  • 10
    Sep 10th
    0 Files
  • 11
    Sep 11th
    0 Files
  • 12
    Sep 12th
    0 Files
  • 13
    Sep 13th
    0 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close