Files
CVEs-PoC/2016/CVE-2016-6795.md
T
2025-09-29 21:09:30 +02:00

24 lines
1.1 KiB
Markdown

### [CVE-2016-6795](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6795)
![](https://img.shields.io/static/v1?label=Product&message=Apache%20Struts&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=2.3.x%20before%202.3.31%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=2.5.x%20before%202.5.5%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Possible%20path%20traversal%20in%20the%20Convention%20plugin&color=brightgreen)
### Description
In the Convention plugin in Apache Struts 2.3.x before 2.3.31, and 2.5.x before 2.5.5, it is possible to prepare a special URL which will be used for path traversal and execution of arbitrary code on server side.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/IkerSaint/VULNAPP-vulnerable-app
- https://github.com/SexyBeast233/SecBooks
- https://github.com/brunsu/woodswiki
- https://github.com/pctF/vulnerable-app
- https://github.com/woods-sega/woodswiki