struts-ognl-console: Apache Struts - OGNL Console

日期: 2025-08-01 | 影响软件: Apache Struts | POC: 已公开

漏洞描述

This development console allows the evaluation of OGNL expressions that could lead to Remote Command Execution

PoC代码[已公开]

id: struts-ognl-console

info:
  name: Apache Struts - OGNL Console
  author: DhiyaneshDK
  severity: unknown
  description: |
    This development console allows the evaluation of OGNL expressions that could lead to Remote Command Execution
  remediation: Restrict access to the struts console on the production server
  reference:
    - https://github.com/PortSwigger/j2ee-scan/blob/master/src/main/java/burp/j2ee/issues/impl/ApacheStrutsWebConsole.java
  classification:
    cpe: cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*
  metadata:
    verified: true
    max-request: 1
    vendor: apache
    product: struts
    shodan-query: html:"Struts Problem Report"
  tags: apache,struts,ognl,panel,misconfig,vuln

http:
  - method: GET
    path:
      - '{{BaseURL}}/struts/webconsole.html?debug=console'

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - 'Welcome to the OGNL console!'

      - type: status
        status:
          - 200
# digest: 490a00463044022015099dde4b0b11dd5aa31a6668d53aedcd0a768c9c8c5a0a254761e5b3b5d024022075246148e0af5bb289b4e9b9293ec26dde9ed438f200a415eb1152fffadb7bf2:922c64590222798bb761d5b6d8e72950

相关漏洞推荐