Target from: CVE Network
5: Flags (other, 2:system, env, root
)
2: Services
1,500 pts
0: Flags found
2: Services discovered
0 pts
This is a target with direct implementation of the CVE-2018-11776 for Apache Struts 2.3.34/2.5.16 and is here to assist in developing exploits for this vulnerability.
Description
Apache Struts versions 2.3 to 2.3.34 and 2.5 to 2.5.16 suffer from possible Remote Code Execution when alwaysSelectFullNamespace
is true (either by user or a plugin like Convention Plugin).
Environment details
The system is accessible at 10.0.200.169
and runs Apache Tomcat on port 8080/tcp
.
8009/tcp
. Flags can be found at:
/root/ETSCTF
/etc/passwd
gecos/etc/shadow
password hashenv
variablehttp://10.0.200.169:8080/ETSCTF.html
url which is also available under/usr/local/tomcat/webapps/ROOT/ETSCTF.html
NOTE: The target IS exploitable, you just need to try harder!!
15 Headshots (newer first)
jaxafed, PufferOverflow, Muzec, Grosik, JDgodd, ElleuchX1, hacker, Pegasus, biba22, sn1per, r0b0tG4nG, TheCyberGeek, AKMalware, abosaif, hitmanalharbi
Activity Stream
Latest activity on the platform
L0n3lyW0lf Discovered a JMX service, 57 months ago
L0n3lyW0lf Discovered a web service, 57 months ago