### [CVE-2016-4438](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4438) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description The REST plugin in Apache Struts 2 2.3.19 through 2.3.28.1 allows remote attackers to execute arbitrary code via a crafted expression. ### POC #### Reference - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html #### Github - https://github.com/20142995/pocsuite3 - https://github.com/ARPSyndicate/cvemon - https://github.com/CrackerCat/myhktools - https://github.com/GhostTroops/myhktools - https://github.com/SexyBeast233/SecBooks - https://github.com/do0dl3/myhktools - https://github.com/fupinglee/Struts2_Bugs - https://github.com/hktalent/myhktools - https://github.com/iqrok/myhktools - https://github.com/jason3e7/CVE-2016-4438 - https://github.com/linchong-cmd/BugLists - https://github.com/tafamace/CVE-2016-4438 - https://github.com/touchmycrazyredhat/myhktools - https://github.com/trhacknon/myhktools - https://github.com/woods-sega/woodswiki