Vulnerability & Exploit Database

Back to search

Apache Struts Jakarta Multipart Parser OGNL Injection

This module exploits a remote code execution vulnerability in Apache Struts version 2.3.5 - 2.3.31, and 2.5 - 2.5.10. Remote Code Execution can be performed via http Content-Type header. Native payloads will be converted to executables and dropped in the server's temp dir. If this fails, try a cmd/* payload, which won't have to write to the disk.

Free Metasploit Download

Get your copy of the world's leading penetration testing tool

 Download Now

Module Name

exploit/multi/http/struts2_content_type_ognl

Authors

  • Nike.Zheng
  • Nixawk
  • Chorder
  • egypt <egypt [at] metasploit.com>
  • Jeffrey Martin

References

Targets

  • Universal

Platforms

  • unix
  • windows
  • linux

Architectures

  • cmd, x86, x64

Reliability

Development

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use exploit/multi/http/struts2_content_type_ognl msf exploit(struts2_content_type_ognl) > show targets ...targets... msf exploit(struts2_content_type_ognl) > set TARGET <target-id> msf exploit(struts2_content_type_ognl) > show options ...show and set options... msf exploit(struts2_content_type_ognl) > exploit

Related Vulnerabilities