Files
CVEs-PoC/2017/CVE-2017-12611.md
T
2024-08-07 19:02:05 +00:00

47 lines
2.1 KiB
Markdown

### [CVE-2017-12611](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12611)
![](https://img.shields.io/static/v1?label=Product&message=Apache%20Struts&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=A%20possible%20Remote%20Code%20Execution%20attack%20when%20using%20an%20unintentional%20expression%20in%20Freemarker%20tag%20instead%20of%20string%20literals&color=brighgreen)
### Description
In Apache Struts 2.0.0 through 2.3.33 and 2.5 through 2.5.10.1, using an unintentional expression in a Freemarker tag instead of string literals can lead to a RCE attack.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/0day666/Vulnerability-verification
- https://github.com/20142995/Goby
- https://github.com/20142995/nuclei-templates
- https://github.com/20142995/pocsuite3
- https://github.com/20142995/sectool
- https://github.com/3llio0T/Active-
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ARPSyndicate/kenzer-templates
- https://github.com/Elsfa7-110/kenzer-templates
- https://github.com/HimmelAward/Goby_POC
- https://github.com/IkerSaint/VULNAPP-vulnerable-app
- https://github.com/Jean-Francois-C/Boot2root-CTFs-Writeups
- https://github.com/SexyBeast233/SecBooks
- https://github.com/TesterCC/exp_poc_library
- https://github.com/Z0fhack/Goby_POC
- https://github.com/Zero094/Vulnerability-verification
- https://github.com/albinowax/ActiveScanPlusPlus
- https://github.com/brianwrf/S2-053-CVE-2017-12611
- https://github.com/ice0bear14h/struts2scan
- https://github.com/khansiddique/VulnHub-Boot2root-CTFs-Writeups
- https://github.com/khodges42/Etrata
- https://github.com/linchong-cmd/BugLists
- https://github.com/lnick2023/nicenice
- https://github.com/pctF/vulnerable-app
- https://github.com/qazbnm456/awesome-cve-poc
- https://github.com/superlink996/chunqiuyunjingbachang
- https://github.com/tdcoming/Vulnerability-engine
- https://github.com/whoadmin/pocs
- https://github.com/woods-sega/woodswiki
- https://github.com/xbl3/awesome-cve-poc_qazbnm456