Apache Archiva 1.3.6 => Remote Command Execution 0day

Apache Archiva 1.3.6 => Remote Command Execution
####################################################################
Author: Kacper
Contact: info[at]devilteam.pl
Home Page: https://devilteam.pl/
####################################################################
Vendor: http://archiva.apache.org/
Dork: “Apache Archiva \ Browse Repository”

Description:
Apache Archiva use Apache Struts2:
“In Struts 2 before 2.3.15.1 the information following “action:”, “redirect:” or
“redirectAction:” is not properly sanitized. Since said information will be evaluated as OGNL expression
against the value stack, this introduces the possibility to inject server side code.”
In Apache Archiva can be use parameter redirect: for OGNL injection.

PoC:
(print devilteam.pl)

{execute netstat)

Demo:

Cheers:
cxsecurity.com
Bartek (ZUOO)
and all people from devilteam.pl

Reference:
http://struts.apache.org/release/2.3.x/docs/s2-016.html
https://devilteam.pl/viewtopic.php?p=43506

原文链接:,转发请注明来源!

发表评论

要发表评论,您必须先登录